Uploaded image for project: 'Cassandra'
  1. Cassandra
  2. CASSANDRA-9590

Support for both encrypted and unencrypted native transport connections

    XMLWordPrintableJSON

Details

    • Improvement
    • Status: Resolved
    • Normal
    • Resolution: Fixed
    • 3.0.0 rc1
    • None
    • None

    Description

      Enabling encryption for native transport currently turns SSL exclusively on or off for the opened socket. Migrating from plain to encrypted requires to migrate all native clients as well and redeploy all of them at the same time after starting the SSL enabled Cassandra nodes.

      This patch would allow to start Cassandra with both an unencrypted and ssl enabled native port. Clients can connect to either, based whether they support ssl or not.

      This has been implemented by introducing a new native_transport_port_ssl config option.
      There would be three scenarios:

      • client encryption disabled, native_transport_port unencrypted, native_transport_port_ssl not used
      • client encryption enabled, native_transport_port_ssl not set, native_transport_port encrypted
      • client encryption enabled, native_transport_port_ssl set, native_transport_port unencrypted, native_transport_port_ssl encrypted

      This approach would keep configuration behavior fully backwards compatible.

      Patch proposal: Branch, Diff cassandra-3.0, Patch against cassandra-3.0

      DTest: Branch, Diff master, Pull Request

      Attachments

        1. nosetest_output.txt
          0.6 kB
          Stefan Podkowinski

        Issue Links

          Activity

            People

              spod Stefan Podkowinski
              spod Stefan Podkowinski
              Stefan Podkowinski
              Robert Stupp
              Votes:
              2 Vote for this issue
              Watchers:
              8 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: