[Openstack-security] [Bug 1287301] Re: Keystone client token cache doesn't respect revoked tokens

Abu Shohel Ahmed ahmed.shohel at ericsson.com
Wed Mar 12 13:33:35 UTC 2014


I agree, we have also identified the issue during Keystone Threat Modelling.  A system should be by default secure.  
However, the performance impact is always a question in this scenario.  We can also have discussion around
OpenStack’s philosophy 'everything will become eventually consistent’  - does it apply for security.  
For the time being, i am willing to volunteer for writing a OSSN on this, if we agree that this a topic to address.

…shohel


On 12 Mar 2014, at 14:11, Matthew Edmonds <edmondsw at us.ibm.com> wrote:

> caching tokens for 5 minutes by default may be all well and good for performance, but not so much for security. Consider the following cases:
> 1) If an admin detects that someone is using a token maliciously, they'll delete it and expect that to stop the usage immediately. But it won't.
> 2) If someone deletes the token they were using and then walks away, they should not have to worry about someone else stepping up and continuing to use that token.
> 
> Is token caching really something we should be doing at all? By default?
> 
> If so, should the default really be as high as 5 minutes? How did we
> settle on such a large value?
> 
> Should we implement a notification mechanism for token revokation which
> would cause listening clients to update their cache immediately? (Note:
> someone may find a way to block the notification, so this isn't
> perfect...)
> 
> -- 
> You received this bug notification because you are a member of OpenStack
> Security Group, which is subscribed to OpenStack.
> https://bugs.launchpad.net/bugs/1287301
> 
> Title:
>  Keystone client token cache doesn't respect revoked tokens
> 
> Status in OpenStack Security Advisories:
>  Invalid
> Status in Python client library for Keystone:
>  In Progress
> 
> Bug description:
>  If we'll enable caching for keystoneclient tokens we'll be able to use
>  tokens that are already revoked if they are present in cache:
> 
>  https://github.com/openstack/python-
>  keystoneclient/blob/0.6.0/keystoneclient/middleware/auth_token.py#L831
> 
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ossa/+bug/1287301/+subscriptions
> 
> _______________________________________________
> Openstack-security mailing list
> Openstack-security at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4163 bytes
Desc: not available
URL: <http://lists.openstack.org/pipermail/openstack-security/attachments/20140312/71a2a066/attachment.bin>


More information about the Openstack-security mailing list