-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding SSL support into kafka-python #447
Comments
Ormod
changed the title
Adding SSL support into the kafka-python
Adding SSL support into kafka-python
Aug 25, 2015
Ormod
added a commit
to Ormod/kafka-python
that referenced
this issue
Nov 9, 2015
…pkp#447 Kafka 0.9.0+ supports using SSL encrypted connections authenticated with client certificates. This adds support for these. After this when using SSL/TLS for Kafka broker connections, TLSv1.0+ is used for authentication, protocols earlier than that are deprecated from the get go as insecure. If keyfile/certificate are left empty, the client can still use SSL/TLS for the transport, but in that case the server must be configured to accept unauthenticated users.
Ormod
added a commit
to Ormod/kafka-python
that referenced
this issue
Nov 9, 2015
…pkp#447 Kafka 0.9.0+ supports using SSL encrypted connections authenticated with client certificates. This adds support for these. After this when using SSL/TLS for Kafka broker connections, TLSv1.0+ is used for authentication, protocols earlier than that are deprecated from the get go as insecure. If keyfile/certificate are left empty, the client can still use SSL/TLS for the transport, but in that case the server must be configured to accept unauthenticated users.
Ormod
added a commit
to Ormod/kafka-python
that referenced
this issue
Nov 16, 2015
…pkp#447 Kafka 0.9.0+ supports using SSL encrypted connections authenticated with client certificates. This adds support for these. After this when using SSL/TLS for Kafka broker connections, TLSv1.0+ is used for authentication, protocols earlier than that are deprecated from the get go as insecure. If keyfile/certificate are left empty, the client can still use SSL/TLS for the transport, but in that case the server must be configured to accept unauthenticated users.
Ormod
added a commit
to Ormod/kafka-python
that referenced
this issue
Nov 16, 2015
…pkp#447 Kafka 0.9.0+ supports using SSL encrypted connections authenticated with client certificates. This adds support for these. After this when using SSL/TLS for Kafka broker connections, TLSv1.0+ is used for authentication, protocols earlier than that are deprecated from the get go as insecure. If keyfile/certificate are left empty, the client can still use SSL/TLS for the transport, but in that case the server must be configured to accept unauthenticated users.
Ormod
added a commit
to Ormod/kafka-python
that referenced
this issue
Nov 18, 2015
…pkp#447 Kafka 0.9.0+ supports using SSL encrypted connections authenticated with client certificates. This adds support for these. After this when using SSL/TLS for Kafka broker connections, TLSv1.0+ is used for authentication, protocols earlier than that are deprecated from the get go as insecure. If keyfile/certificate are left empty, the client can still use SSL/TLS for the transport, but in that case the server must be configured to accept unauthenticated users.
dup of #253 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Now that Kafka-1690 (https://issues.apache.org/jira/browse/KAFKA-1690) has been merged into Kafka master it would be great if python-kafka could use TLS as well.
The text was updated successfully, but these errors were encountered: