Some Eclipse Foundation services are deprecated, or will be soon. Please ensure you've read this important communication.

Bug 147061

Summary: Dynamic discovery (remote peer monitor) does not work with security enabled
Product: z_Archived Reporter: Qiyan Li <qiyanli>
Component: TPTPAssignee: Bing Xu <xubing>
Status: CLOSED WONTFIX QA Contact:
Severity: enhancement    
Priority: P2 CC: ashishp, ewchan, jgwest, jkubasta, jptoomey, rdanek, sluiman
Version: unspecifiedKeywords: plan
Target Milestone: ---   
Hardware: All   
OS: All   
Whiteboard: housecleaned460 closed460

Description Qiyan Li CLA 2006-06-14 10:42:52 EDT
Dynamic discovery (remote peer attach) does not work with security enabled. 

Scenario: 2 machines, with RAC security enabled. Connect to Machine 1, and then
run your distributed application that goes from machine 1 to machine 2. Try
doing a remote peer monitor from the rac on machine 2 to machine 1. It will
fail. (i.e., machine 2 cannot be dynamically discovered). 

The expected behaviour is that when the remote peer monitor is attempted, the
user/password dialog will pop up in the workbench asking for the user to
authenticate to machine 2. If the user enters the correct name/password
information, then machine 2 will automatically appear in the profling monitor.
Comment 1 Qiyan Li CLA 2006-06-14 10:44:23 EDT
*** Bug 101571 has been marked as a duplicate of this bug. ***
Comment 2 Karla Callaghan CLA 2006-06-14 12:55:02 EDT
If you follow the link to the duplicate (which is actually the original bug) you find that this bug has been around for a long time and was deferred from prior releases.

So why is it now believed to be a blocker bug for 4.2?  In the original bug it was marked as a Major P3.
Comment 3 Hendra Suwanda CLA 2006-06-14 13:19:24 EDT
This should be targeted for 4.2.1.

Reducing severity to be consistent wih bug 101571, and increasing priority to P1 because of customer need.

We still need to do proper sizing and depending on the sizing we will make the decision.
Comment 4 Qiyan Li CLA 2006-06-15 00:26:15 EDT
This defect was opened so that the defect can show up in TPTP --- the original defect was in Hyades, and slipped through the TPTP defect tracking process.
Comment 5 Samson Wai CLA 2006-06-28 09:38:46 EDT
Resetting priority for 4.2.1:
- P1: commit to fix
- P2: fix if time allows
- P3: fix if all P1 and P2 are fixed
Comment 6 Ashish Patel CLA 2006-06-28 09:50:44 EDT
I would like to stress that products building on top of TPTP need this functionality, so despite priority please take into consideration that the severity of this defect is "major". Adding Hendra for tracking.
Comment 7 Karla Callaghan CLA 2006-07-10 17:49:33 EDT
Retarget to 4.3.  Insufficient resource to be done in 4.2.1.
Comment 8 Joe Toomey CLA 2006-07-13 12:48:20 EDT
I'd like to re-evaluate both the priority and the target milestone of this defect.  While it's true that the original defect has been around for a long time, our consuming product was unaffected because, due to the many other limitations of the secure RAC, we simply did not use security at all.  Based on feedback that secure AC is a requirement, we have spent time fixing most of those other limitations, but this issue continues to preclude us from using the secure AC.  Thus the desire for a higher priority, and to see it fixed in 4.2.1 if possible.

I realize this is problematic given Samson & Hendra's absences, but I'd stil like to keep this defect for consideration of 4.2.1, and we can all try to scare up resources with the necessary background to fix it.
Comment 9 Karla Callaghan CLA 2006-07-13 13:02:10 EDT
Adding Bob to the CC list.
Comment 10 Samson Wai CLA 2006-10-30 10:27:34 EST
Not containable in 4.3 and retarget to 4.4. Please let me know if you have any concern.
Comment 11 Samson Wai CLA 2007-01-31 16:09:45 EST
Set priority to P1 for 4.4 plan closure.
Comment 12 Samson Wai CLA 2007-02-16 15:12:37 EST
Not containable in 4.4.
Comment 13 Samson Wai CLA 2007-11-27 09:30:07 EST
Hi Bing. I have transferred my bugs to you for triage. Thanks.
Comment 14 Bing Xu CLA 2008-02-04 10:57:33 EST
Discussed this with Jonathan.  The current interface of agent does not support user authentication.  Authentication is only implemented on client side.  So Peer Monitoring won't work with security turned on.  

Further investigation is needed in order to provide an estimation.  Joanna, can we move it to Future?
Comment 15 Harm Sluiman CLA 2008-02-04 17:26:33 EST
(In reply to comment #14)
> Discussed this with Jonathan.  The current interface of agent does not support
> user authentication.  Authentication is only implemented on client side.  So
> Peer Monitoring won't work with security turned on.  
> 
> Further investigation is needed in order to provide an estimation.  Joanna, can
> we move it to Future?
> 

Is this actually a regression that is 1.5 years old, or a feature request?
Comment 16 Jonathan West CLA 2008-02-04 20:36:05 EST
Hi Harm, it's a feature request. AFAIK the requirement that the remote peer have the l/p to a valid administrative account on the local machine in order to authenticate itself has always restricted its implementation. The earlier bug (which is a dupe of this for an unknown reason) was opened over two-and-a-half years ago, and hasn't made the cut for any particular iteration.
Comment 17 Harm Sluiman CLA 2008-02-10 20:16:14 EST
(In reply to comment #16)
> Hi Harm, it's a feature request. AFAIK the requirement that the remote peer
> have the l/p to a valid administrative account on the local machine in order to
> authenticate itself has always restricted its implementation. The earlier bug
> (which is a dupe of this for an unknown reason) was opened over two-and-a-half
> years ago, and hasn't made the cut for any particular iteration.
> 

Thanks, so check with Eugene and Joanna to make sure this is not required, and then change it to an enhancement request. I can easily see the need for this, but it will not be trivial to design and impl.
Comment 18 Bing Xu CLA 2008-02-12 14:52:21 EST
Joanna and Eugene,

Can you confirm that implementation of user authentication was not part of original requirement of agent API?   Thanks.


> > Hi Harm, it's a feature request. AFAIK the requirement that the remote peer
> > have the l/p to a valid administrative account on the local machine in order to
> > authenticate itself has always restricted its implementation. The earlier bug
> > (which is a dupe of this for an unknown reason) was opened over two-and-a-half
> > years ago, and hasn't made the cut for any particular iteration.
> > 

> Thanks, so check with Eugene and Joanna to make sure this is not required, and
> then change it to an enhancement request. I can easily see the need for this,
> but it will not be trivial to design and impl.

Comment 19 Eugene Chan CLA 2008-02-13 14:35:37 EST
The original design of the client did not include the user/password prompt for secure peer discovery connection. It requires communication on the agent side to request and retrieve the user/password from the client side. 

Ashish, I understand this is a requirement from downstream product that you worked on. Do you know who is the new contact of the product? We need to make sure if this is still a high priority request from product?
Comment 20 Ashish Patel CLA 2008-02-22 10:50:38 EST
>> [Bing] Has it been implemented before or never worked?

AFAIK this has never been implemented before and thus never worked.  I assume that this was apart of the original design since the single RAC connection case requires a username/pwd; however, I during our dev/testing a few years ago we noticed it wasn't actually implemented.  I hope that helps, let me know if you have any additional questions.
Comment 21 jkubasta CLA 2008-03-07 15:20:25 EST
Bing, is this feature containable in 4.5? It was requested by a consuming product.
Comment 22 Bing Xu CLA 2008-03-07 16:20:30 EST
Joanna, I will discuss it with Jonathan on Monday (he is off today) to provide an estimation.  It is high priority among my open I6 defects.
Comment 23 Kathy Chan CLA 2009-02-23 13:39:33 EST
Mass update of P1 enhancements and defects targetted to future to P2.
Comment 24 Paul Slauenwhite CLA 2009-06-30 06:35:24 EDT
As of TPTP 4.6.0, TPTP is in maintenance mode and focusing on improving quality by resolving relevant defects and increasing test coverage through test creation, automation, Build Verification Tests (BVTs), and expanded run-time execution. As such, TPTP is not delivering enhancements. As part of the TPTP Bugzilla housecleaning process (see http://wiki.eclipse.org/Bugzilla_Housecleaning_Processes), this enhancement is resolved as WONTFIX. For this enhancement to be considered, please re-open with an attached patch including the Description Document (see http://www.eclipse.org/tptp/home/documents/process/development/description_documents.html), code (see http://www.eclipse.org/tptp/home/documents/resources/TPTPDevGuide.htm), and test cases (see http://www.eclipse.org/tptp/home/documents/process/TPTP_Testing_Strategy.html).
Comment 25 Paul Slauenwhite CLA 2009-06-30 06:37:22 EDT
As of TPTP 4.6.0, TPTP is in maintenance mode and focusing on improving quality by resolving relevant defects and increasing test coverage through test creation, automation, Build Verification Tests (BVTs), and expanded run-time execution. As such, TPTP is not delivering enhancements. As part of the TPTP Bugzilla housecleaning process (see http://wiki.eclipse.org/Bugzilla_Housecleaning_Processes), this enhancement is resolved as WONTFIX. For this enhancement to be considered, please re-open with an attached patch including the Description Document (see http://www.eclipse.org/tptp/home/documents/process/development/description_documents.html), code (see http://www.eclipse.org/tptp/home/documents/resources/TPTPDevGuide.htm), and test cases (see http://www.eclipse.org/tptp/home/documents/process/TPTP_Testing_Strategy.html).
Comment 26 Paul Slauenwhite CLA 2009-06-30 10:24:36 EDT
As of TPTP 4.6.0, TPTP is in maintenance mode and focusing on improving quality by resolving relevant enhancements/defects and increasing test coverage through test creation, automation, Build Verification Tests (BVTs), and expanded run-time execution. As part of the TPTP Bugzilla housecleaning process (see http://wiki.eclipse.org/Bugzilla_Housecleaning_Processes), this enhancement/defect is verified/closed by the Project Lead since the originator of this enhancement/defect has an inactive Bugzilla account and considered to be fixed. If this enhancement/defect is still unresolved and reproducible in the latest TPTP release (http://www.eclipse.org/tptp/home/downloads/), please re-open.