Re: [DISCUSS] KIP-506: Allow setting SCRAM password via Admin interface

2019-10-24 Thread Viktor Somogyi-Vass
Hey Tom, "The intent behind sasl.scram.password.change.enabled was to give the admins the choice about whether they're willing for passwords to be sent to the broker in the clear (after all they know their deployment and network best)." I can see one advantage which is testing during development

Re: [DISCUSS] KIP-506: Allow setting SCRAM password via Admin interface

2019-10-22 Thread Tom Bentley
Hi Viktor and Colin, Thanks for taking a look. The intent behind sasl.scram.password.change.enabled was to give the admins the choice about whether they're willing for passwords to be sent to the broker in the clear (after all they know their deployment and network best). I'm fine with removing i

Re: [DISCUSS] KIP-506: Allow setting SCRAM password via Admin interface

2019-10-21 Thread Colin McCabe
On Mon, Oct 21, 2019, at 03:59, Viktor Somogyi-Vass wrote: > Hey Tom, > > Bringing over the conversation from KIP-500 and also adding my > observations. Let me capture them in points. > > 1. Perhaps I'm a bit aggressive in introducing new features but I'm not > sure if we need sasl.scram.password

Re: [DISCUSS] KIP-506: Allow setting SCRAM password via Admin interface

2019-10-21 Thread Viktor Somogyi-Vass
Hey Tom, Bringing over the conversation from KIP-500 and also adding my observations. Let me capture them in points. 1. Perhaps I'm a bit aggressive in introducing new features but I'm not sure if we need sasl.scram.password.change.enabled. As I understand it controls whether your can use the Adm

[DISCUSS] KIP-506: Allow setting SCRAM password via Admin interface

2019-08-12 Thread Tom Bentley
Hi All, I've written KIP-506 proposing an RPC and Admin interface for setting SCRAM user passwords. I think there could be an interesting discussion over the relative merits of hashing on the broker or client. In any case I'd be grateful for any comments you may have: https://cwiki.apache.org/con