[ 
https://issues.apache.org/jira/browse/FLINK-9312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16473448#comment-16473448
 ] 

ASF GitHub Bot commented on FLINK-9312:
---------------------------------------

Github user StephanEwen commented on the issue:

    https://github.com/apache/flink/pull/5966
  
    I agree, we need different key/truststores for the internal/external 
connectivity. This PR was meant as a step in that direction, separating at 
least within the SSL Utils the internal and external context setup.
    
    In your thinking, is there ever a case for a different internal 
authentication method than "single trusted certificate"? What if were not tied 
to akka? (Side note: I think for internal communication, 'authentication is 
authorization' is probably reasonable, because the are no different users/roles 
for internal communication).
    
    Would you assume that internally, we never do hostname verification?


> Perform mutual authentication during SSL handshakes
> ---------------------------------------------------
>
>                 Key: FLINK-9312
>                 URL: https://issues.apache.org/jira/browse/FLINK-9312
>             Project: Flink
>          Issue Type: New Feature
>          Components: Security
>            Reporter: Stephan Ewen
>            Priority: Major
>             Fix For: 1.6.0
>
>
> Currently, the Flink processes encrypted connections via SSL:
>   - Data exchange TM - TM
>   - RPC JM - TM
>   - Blob Service JM - TM
> However, the server side always accepts any client to build up the 
> connection, meaning the connections are not strongly authenticated.
> Activating SSL mutual authentication solves that - only processes that have 
> the same certificate can connect.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to