[Openstack-security] [Bug 890411] Re: Tenant role conflicts/overlaps can be a security issue

Morgan Fainberg morgan.fainberg at gmail.com
Wed Jun 4 23:06:09 UTC 2014


Correction, marked as Invalid.

-- 
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/890411

Title:
  Tenant role conflicts/overlaps can be a security issue

Status in OpenStack Identity (Keystone):
  Invalid

Bug description:
  During the validate token call all the tenant roles (associated with
  the tenant scoped token) are returned to the middle-ware component and
  then passed along in the X_ROLES header to the OS service for
  consumption.  In the case were more than one OS service are bound to
  the same tenant (e.g. Swift and Nova, or Nova 1 and Nova 2),  a user
  with particular role for one service, lets just say  the 'Admin' role
  will now also have the 'Admin' role in the second service.  This is
  because roles are currently only scoped to the tenant level.  The
  middle-ware just takes all returned tenant roles and stuffs them into
  the X_ROLES header regardless of the actual service the middle-ware is
  protecting.  A quick fix to this problem would be to change the
  validate token interfaces (GET/HEAD /tokens/{tokenId}) to require a
  {serviceId} filter... so something like GET
  /tokens/{tokenId}?serviceId={serviceId}.  The Keystone service would
  then only return roles in the response that are tied to that specific
  serviceId.  If the serviceId was not provided, or was invalid, or no
  roles where found for that serviceId, then a 401 would be returned.
  Future Keystone work could consider allowing to filter down to the
  {endpointId}, but for such a change it would require a data model
  change to allow serviceIds to be defined on endpoint references....
  Not to mention more API changes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/890411/+subscriptions




More information about the Openstack-security mailing list