[Openstack-security] Authentication token generation using UUID

Abu Shohel Ahmed ahmed.shohel at ericsson.com
Tue Feb 11 12:34:13 UTC 2014



On 11 Feb 2014, at 03:51, Adam Young <ayoung at redhat.com> wrote:

> On 02/10/2014 09:19 AM, Abu Shohel Ahmed wrote:
>> Hi,
>> 
>> Currently, Keystone Token provider (both PKI and UUID) relies on uuid.uuid4 to generate token which
>> is used as an authentication token during its lifetime. 
> 
> Not true for PKI tokens, only UUID.  PKI tokens are crypto signd (CMS), and then their ID is the MD5 hash of the signed document.
> 
> And a new format it in the works…

+ true

_get_token_id function overriding happens in pki.py

>> 
>> def _get_token_id(self, token_data):
>>      return uuid.uuid4().hex
>> 
>> My question is how secure is UUID4 token. According to RFC 4122
>> 
>> "Do not assume that UUIDs are hard to guess; they should not be used
>>    as security capabilities (identifiers whose mere possession grants
>>    access)"
>> 
>> The implementation of UUID4 relies on os.urandom() which provides pretty good randomness. However, there are still 
>> concerns about its randomness. See the thread herehttp://stackoverflow.com/questions/817882/unique-session-id-in-python. 
>> 
>> Should it be a security bug for keystone ? If it is, both PKI and UUID token generation process is vulnerable.
>> 
>> ...shohel
>> 
>> 
>> _______________________________________________
>> Openstack-security mailing list
>> Openstack-security at lists.openstack.org
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
> 
> _______________________________________________
> Openstack-security mailing list
> Openstack-security at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-security/attachments/20140211/76417cb8/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4163 bytes
Desc: not available
URL: <http://lists.openstack.org/pipermail/openstack-security/attachments/20140211/76417cb8/attachment.bin>


More information about the Openstack-security mailing list