Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Status

Current state: Under Discussion Accepted

Discussion thread: kafka-dev

...

  1. sasl.mechanism (String) SASL mechanism used for client connections. This may be any mechanism for which a security provider is available in the JVM. Default value is GSSAPI.
  2. sasl.enabled.mechanisms (List<String>) The list of SASL mechanisms enabled in the Kafka server. This may include any mechanism for which a security provider is available in the JVM. Default value is GSSAPI.
  3. sasl.mechanism.inter.broker.protocol (String) SASL mechanism used for inter-broker connections. Default value is GSSAPI.

Protocol changes

A new Kafka SaslHandshakeRequest and response type will be defined to add a handshake request flow to enable clients to communicate their chosen SASL mechanism to the broker. The formats of the request and response are shown below:

Code Block
languagetext
titleSaslHandshakeRequest
SaslHandshakeRequest => Mechanism
  Mechanism => string

FieldDescription
MechanismThe SASL mechanism chosen by the client for SASL authentication
Code Block
languagetext
titleSaslHandshakeResponse
SaslHandshakeResponse => ErrorCode EnabledMechanisms
  ErrorCode => int16
  EnabledMechanisms => [string]
FieldDescription
ErrorCodeError code set to NONE(0) if the request succeeds. UNSUPPORTED_SASL_MECHANISM is returned if the mechanism specified in the client request is not enabled in the broker. ILLEGAL_SASL_STATE indicates that the request was unexpected. Kafka Sasl handshake requests may be sent only once, prior to the actual SASL authentication flow.
EnabledMechanismsArray of mechanisms enabled in the broker

Successful Kafka SaslHandshakeRequest/Response flow should be immediately followed by the actual SASL authentication packets using the selected SASL mechanism. SASL authentication exchange consists of opaque client and server tokens as defined by the SASL mechanism and are typically obtained using a standard SASL library. These packets are not prefixed with Kafka request/response headers. No further Kafka requests may be sent until SASL authentication exchange is completed. For interoperability with 0.9.0.x, the Kafka handshake request flow is omitted for inter-broker communication using SASL for connections to older brokers.

Proposed Changes

The changes will be implemented under KAFKA-3149. The implementation will include changes to support additional mechanisms and enable multiple mechanisms in the broker. A simple default implementation for SASL/PLAIN in Kafka that is currently in KAFKA-2658 will also be included. This section gives a summary of the changes and the rationale behind them.

...

Clients may enable only one mechanism and the mechanism name is sent to the server before any SASL authentication packets are sent, if the mechanism is not GSSAPI. Server fails the authentication if the client mechanism is not enabled in the broker. For inter-broker communication, sasl.mechanism.inter.broker.protocol configuration on the broker is used by the client-mode connection to choose the SASL mechanism.

...

To keep the Kafka protocol simple, only a single SASL mechanism is allowed for Kafka clients. For protocols other than GSSAPI, client sends the protocol Clients send the mechanism name to the server in a handshake request before any SASL authentication packets are sent. Kafka server checks the first packet and if it is one of the mechanism names that it recognizes including custom protocol mechanism names, it switches to that mechanism and starts SASL authentication using subsequent packets. If not, the server defaults to GSSAPI mechanism, treating the first packet as the first GSSAPI authentication packet from the client.With GSSAPI, the first context establishment packet starts with byte 0x60 (APPLICATION-0 tag) followed by a variable-length encoded size. The first mechanism name packet from Kafka starts with a two-byte version currently set to zero, followed by a mechanism name, making it easy to distinguish from a GSSAPI packet. To avoid conflicts and simplify debugging, Kafka will avoid version numbers for mechanism flow that conflict with the GSSAPI tag in the first byte. The Kafka Java client implementation skips mechanism handshake request flow for GSSAPI to remain interoperable with for inter-broker connections if inter.broker.protocol.version is 0.9.0.x brokers, enabling rolling upgrade of 0.9.0.x clusters which use SASL for replication. Non-Java clients may send mechanism name Handshake requests are sent by other clients even for GSSAPI from 0.10.0.0 onwards.

With GSSAPI, the first context establishment packet starts with byte 0x60 (APPLICATION-0 tag) followed by a variable-length encoded size. The first Kafka handshake request packet containing client mechanism starts with a two-byte API key of 0x0011, making it easy to distinguish from a GSSAPI packet.

Client flow:

  1. If sasl.mechanism is not GSSAPI, send a Kafka handshake request packet with the mechanism name to the server. Otherwise go to Step 3.

    ...

      • Request Format: |

    ...

      • Kafka RequestHeader | Kafka SaslHandshakeRequest |
    1. Wait for response from the server. If the error code in the response is non-zero, indicating failure, report the error and fail authentication.
    2. Perform SASL authentication with the configured client mechanism. SASL authentication packets do not contain a Kafka RequestHeader.
      • Client token Format: | Size (int32) | SASL client authentication token |

    Server flow:

    1. Wait for first authentication packet from client
    2. If this packet is a not valid mechanism Kafka handshake request, go to Step 4 and process this packet as the first GSSAPI client token
    3. If the client mechanism in the Kafka handshake request received in Step 2 is enabled in the broker, send a response with error code zero and start authentication using the specified mechanism. Otherwise, send an error response including the list of enabled mechanisms and fail authentication.
      • Packet Response Format: | KafkaResponseHeader | ErrorCode (Int16) | EnabledMechanisms (ArrayOf(String)) Kafka ResponseHeaderKafka SaslHandshakeResponse |
    4. Perform SASL authentication with the selected mechanism. If mechanism exchange was skipped, process the initial packet that was received from the client first. SASL authentication packets are expected without a Kafka RequestHeader until SASL authentication exchange completes. SASL server authentication packets are sent back without a Kafka response header.
      • Server token Format: | Size (int32) | SASL server authentication token |

    Step 3 in the client flow and Step 4 in the server flow correspond to the start of the actual SASL authentication exchange when authentication tokens are exchanged for the selected SASL mechanism. These are treated as opaque tokens and are processed by the SASL provider of the mechanism. No further Kafka requests may be sent until the authentication exchange completes.

    SASL/PLAIN implementation

    SASL/PLAIN is a simple username/password authentication mechanism that is typically used with TLS for encryption to implement secure authentication. Unlike Kerberos, PLAIN does not require complex authentication infrastructure. Adding a default implementation for PLAIN in Kafka enables a simpler authentication mechanism for organizations which do not already use Kerberos. SASL/PLAIN protocol and its uses are described in https://tools.ietf.org/html/rfc4616.
    The PR in KAFKA-2658 will be rebased on the extensible interface from this KIP for this implementation. For the default SASL/PLAIN implementation included in Kafka, the username specified as authentication ID will be used as the authorization ID and principal.

    ...

    Existing clients will continue to use GSSAPI as the SASL mechanism and will not be impacted by the changes. Since default callback handlers can be used for SASL mechanisms that are implemented in Kafka, no configuration changes are required.

    Rolling upgrade from 0.9.0.

    ...

    x

    Rolling upgrade with GSSAPI as the SASL mechanism can be performed using a simple standard rolling restart with no change in properties inter.broker.protocol.version set to 0.9.0.x in the first sequence of the upgrade. By default, if sasl.mechanism property is not specified, GSSAPI will be used without any exchange of mechanisms. Handshake requests are not sent for GSSAPI when inter.broker.protocol.version is 0.9.0.x. Once the cluster is upgraded, inter.broker.protocol.version can be set to 0.10.0, enabling handshake requests for all SASL connections. If the mechanism is to be changed, this rolling restart can be followed by the addition of the new mechanism as described below.

    ...