[Openstack-security] [Bug 1188189] Fix merged to neutron (master)

OpenStack Infra 1188189 at bugs.launchpad.net
Thu Mar 6 07:12:30 UTC 2014


Reviewed:  https://review.openstack.org/70906
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=7255e056092f034daaeb4246a812900645d46911
Submitter: Jenkins
Branch:    master

commit 7255e056092f034daaeb4246a812900645d46911
Author: Kevin Benton <blak111 at gmail.com>
Date:   Sun Feb 2 20:46:18 2014 -0800

    BigSwitch: Add SSL Certificate Validation
    
    This patch adds the option to use SSL certificate
    validation on the backend controller using SSH-style
    sticky authentication, individual trusted
    certificates, and/or certificate authorities.
    Also adds caching of connections to deal with
    increased overhead of TLS/SSL handshake.
    
    Default is now sticky-style enforcement.
    
    Partial-Bug: 1188189
    Implements: blueprint bsn-certificate-enforcement
    Change-Id: If0bab196495c4944a53e0e394c956cca36269883

-- 
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1188189

Title:
  Some server-side 'SSL' communication fails to check certificates (use
  of HTTPSConnection)

Status in Cinder:
  In Progress
Status in OpenStack Identity (Keystone):
  In Progress
Status in OpenStack Neutron (virtual network service):
  In Progress
Status in OpenStack Compute (Nova):
  Confirmed
Status in OpenStack Security Advisories:
  Won't Fix
Status in OpenStack Security Notes:
  Fix Released
Status in Python client library for Keystone:
  Fix Released
Status in OpenStack Object Storage (Swift):
  Invalid

Bug description:
  Grant Murphy from Red Hat reported usage of httplib.HTTPSConnection
  objects. In Python 2.x those do not perform CA checks so client
  connections are vulnerable to MiM attacks.

  """
  The following files use httplib.HTTPSConnection :
  keystone/middleware/s3_token.py
  keystone/middleware/ec2_token.py
  keystone/common/bufferedhttp.py
  vendor/python-keystoneclient-master/keystoneclient/middleware/auth_token.py

  AFAICT HTTPSConnection does not validate server certificates and
  should be avoided. This is fixed in Python 3, however in 2.X no
  validation occurs. I suspect this is also applicable to most OpenStack
  modules that make HTTPS client calls.

  Similar problems were found in ovirt:
  https://bugzilla.redhat.com/show_bug.cgi?id=851672 (CVE-2012-3533)

  With solutions for ovirt:
  http://gerrit.ovirt.org/#/c/7209/
  http://gerrit.ovirt.org/#/c/7249/
  """

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1188189/+subscriptions




More information about the Openstack-security mailing list