protocol should default to tls if security is set
See original GitHub issueIf there is nothing that speaks against that I would file a PR for this.
Should I only do this if encryption is required by the security object?
Another question: does it make sense to add a feature to automatically generate certificates for worker, scheduler and client in the jobque case?
Currently you will get an runtime error:
RuntimeError: encryption required by Dask configuration, refusing communication from/to 'tcp://'
(Actually I then accidentially set tls via the scheduler options which made things worse: the workers silently failed to connect)
Issue Analytics
- State:
- Created 2 years ago
- Comments:7 (7 by maintainers)
Top Results From Across the Web
Update to enable TLS 1.1 and TLS 1.2 as default secure ...
Describes an update that adds TLS 1.1 and TLS 1.2 to default security protocols in Windows Server 2012, Windows 7 SP1, and Windows...
Read more >How to Enable TLS 1.2 as the Default Security Protocol on ...
A step-by-step instructions on how to enable TLS 1.2 as the default security protocol on Windows Server 2012 R2 or older (screenshots ...
Read more >What is TLS & How Does it Work? | ISOC Internet Society
TLS is normally implemented on top of TCP in order to encrypt Application Layer protocols such as HTTP, FTP, SMTP and IMAP, although...
Read more >Overriding the SSL protocol defined by the default SSL socket ...
If you have not explicitly configured an SSL socket factory, you can use a system property to override the SSL protocol that is...
Read more >Defaulting Your System to use TLS 1.2 for .NET Applications
As you move your web applications (such as SpiraTest, SpiraTeam, SpiraPlan, or KronoDesk) to newer encryption protocols such as Transport ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I think only supporting file certificates in
dask-jobqueue
would be reasonable. In places likedask-cloudprovider
we are limited to passing the certs in the Dask config because we can’t guarantee there will be a shared filesystem. But for HPC I think most cases there will be one.I commented on why I did this in #520, because one could actually close this issue by only supporting file certificates in the first place. TL;DR: I think using
dask.config.set
alternatively could have an bigger impact than creating some tempfiles, but maybe I am not completely getting the trick here.