I using Kafka v 0.9 with TLS enabled, including client auth.

In
http://www.confluent.io/blog/apache-kafka-security-authorization-authentication-encryption,
it is mentioned that "We need to generate a key and certificate for each
broker and client in the cluster. The common name (CN) of the broker
certificate must match the fully qualified domain name (FQDN) of the server
as the client compares the CN with the DNS domain name to ensure that it is
connecting to the desired broker (instead of a malicious one)."

1) Is there a specific additional configuration parameter to enable this or
does it always happen if the other TLS/SSL parameters are set (as e.g.
shown below) ?

2) Is it possible to make the broker(s) carry out the same check against
client certificates if SSL client auth is enabled ?

Regards,
Phi


listeners=SSL://:9093

authorizer.class.name=kafka.security.auth.SimpleAclAuthorizer

super.users=User:CN=broker1.mydomain.com,OU=ABC,O=XYZ,L=SFO,ST=CA,C=US

ssl.keystore.location=/opt/ssl/kafka.server.keystore.jks
ssl.keystore.password=test1234
ssl.key.password=test1234
ssl.truststore.location=/opt/ssl/kafka.server.truststore.jks
ssl.truststore.password=test1234

ssl.enabled.protocols=TLSv1.2,TLSv1.1,TLSv1
ssl.keystore.type=JKS
ssl.truststore.type=JKS

security.inter.broker.protocol=SSL

ssl.client.auth=required

Reply via email to