From gerrit2 at review.openstack.org Wed Oct 1 01:29:54 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Wed, 01 Oct 2014 01:29:54 +0000 Subject: [Openstack-security] [openstack/nova] SecurityImpact review request change I28fdd5268b26b21469889d098f06a82fe188ad1a Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/125249 Log: commit cc5943577ad3cbd164e3525847399d705229f833 Author: melanie witt Date: Wed Oct 1 00:42:52 2014 +0000 use safe SSL connection in xenserver glance plugin httplib.HTTPSConnection is known to not verify SSL certificates in Python 2.x. This change replaces use of httplib.HTTPSConnection with the requests module. It uses the existing nova config setting "glance.api_insecure" to decide whether or not to verify certs. SecurityImpact DocImpact Closes-Bug: #1374001 Change-Id: I28fdd5268b26b21469889d098f06a82fe188ad1a From thierry.carrez+lp at gmail.com Wed Oct 1 07:29:53 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Wed, 01 Oct 2014 07:29:53 -0000 Subject: [Openstack-security] [Bug 1367238] Re: IBM NAS cinder driver sets 'rw' permissions to all during volume create operation, which is security issue References: <20140909112305.32185.63569.malonedeb@gac.canonical.com> Message-ID: <20141001072955.32158.57386.launchpad@gac.canonical.com> ** Changed in: cinder Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1367238 Title: IBM NAS cinder driver sets 'rw' permissions to all during volume create operation, which is security issue Status in Cinder: Fix Released Status in OpenStack Security Advisories: Won't Fix Bug description: IBM NAS cinder driver sets 'rw' permissions to all during volume create operation from a volume snapshot or from an existing volume (volume clone operation). This is not required as 'rw' permissions to the user only should be sufficient. This also helps resolve the security issue setting 'rw' permissions to all. To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1367238/+subscriptions From thierry.carrez+lp at gmail.com Wed Oct 1 07:28:41 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Wed, 01 Oct 2014 07:28:41 -0000 Subject: [Openstack-security] [Bug 1321906] Re: [EDP] Swift credentials passed in plain text References: <20140521195819.29499.71748.malonedeb@wampee.canonical.com> Message-ID: <20141001072844.17942.94654.launchpad@chaenomeles.canonical.com> ** Changed in: sahara Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1321906 Title: [EDP] Swift credentials passed in plain text Status in OpenStack Security Advisories: Won't Fix Status in OpenStack Data Processing (Sahara, ex. Savanna): Fix Released Bug description: For Sahara, we support job binaries and data sources in Swift. Job binaries are accessed from the Sahara process, and data sources are accessed from Hadoop at job execution time. Username/password credentials are required for swift access. These credentials might be/are compromised in the following ways: 1) For both job binaries and data sources, objects are created and stored in the Sahara database that contain the path and the associated credentials in plain text. Anyone gaining access to the database can therefore read the username/password credentials stored there with the swift path. 2) For data sources, the credentials are passed as part of the Hadoop job configuration. Currently all Hadoop jobs are run as Oozie workflows. The swift username and password values are set in the workflow.xml file, and are visible to anyone that can access the Oozie UI console, use the Oozie command line to retrieve the workflow.xml, or even use hadoop fs to look at the files uploaded for the job (which include the workflow.xml) We need a way for Sahara and Hadoop to access swift objects securely, without exposing swift credentials in workflow.xml or storing them in the database in plain text. In the future we will support mechanisms other than Oozie so this is not just an Oozie issue per se. For further background, here is the Hadoop patch that allows Hadoop to access swift paths. It uses a service suffix in the netlocation portion of the URL to match the URL against credential values in the job configuration. Any solution to this issue will require a new patch to Hadoop itself, as well as changes to the Sahara code base. https://issues.apache.org/jira/browse/HADOOP-8545 It's been suggested within the Sahara team that we can potentially accomplish this with trusts. Note, this vulnerability isn't really a secret to anyone observant who is familiar with Sahara EDP, but it is probably better not to trumpet it too loudly. To manage notifications about this bug go to: https://bugs.launchpad.net/ossa/+bug/1321906/+subscriptions From thierry.carrez+lp at gmail.com Wed Oct 1 07:35:31 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Wed, 01 Oct 2014 07:35:31 -0000 Subject: [Openstack-security] [Bug 1369627] Re: libvirt disk.config will have issues when booting two with different config drive values References: <20140915153310.17745.11485.malonedeb@chaenomeles.canonical.com> Message-ID: <20141001073535.17709.72829.launchpad@chaenomeles.canonical.com> ** Changed in: nova Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1369627 Title: libvirt disk.config will have issues when booting two with different config drive values Status in OpenStack Compute (Nova): Fix Released Status in OpenStack Security Advisories: Won't Fix Bug description: Currently, in the image creating code for Juno we have if configdrive.required_by(instance): LOG.info(_LI('Using config drive'), instance=instance) image_type = self._get_configdrive_image_type() backend = image('disk.config', image_type) backend.cache(fetch_func=self._create_configdrive, filename='disk.config' + suffix, instance=instance, admin_pass=admin_pass, files=files, network_info=network_info) The important thing to notice here is that we have "filename='disk.confg' + suffix". This means that the filename for the config drive in the cache directory will be simply 'disk.config' followed by any potential suffix (e.g. '.rescue'). This name is not unique to the instance whose config drive we are creating. Therefore, when we go to boot another instance with a different config drive, the cache function will detect the old config drive, and decide it doesn't need to create the new config drive with the appropriate config for the new instance. To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1369627/+subscriptions From thierry.carrez+lp at gmail.com Wed Oct 1 07:44:35 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Wed, 01 Oct 2014 07:44:35 -0000 Subject: [Openstack-security] [Bug 1369487] Re: NIST: increase RSA key length to 2048 bit References: <20140915100120.18130.90286.malonedeb@chaenomeles.canonical.com> Message-ID: <20141001074438.32158.13219.launchpad@gac.canonical.com> ** Changed in: nova Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1369487 Title: NIST: increase RSA key length to 2048 bit Status in OpenStack Compute (Nova): Fix Released Status in OpenStack Security Advisories: Won't Fix Bug description: According to NIST 800-131A, RSA key lenght for digital signature must >= 2048 bit. In crypto.py, we use 1024 bit as the default key length to generate cert file, and does not specify any larger number to override the default value when utilizing it. def generate_x509_cert(user_id, project_id, bits=1024): Need to increase the default key length to 2048 bit. To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1369487/+subscriptions From thierry.carrez+lp at gmail.com Wed Oct 1 07:43:17 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Wed, 01 Oct 2014 07:43:17 -0000 Subject: [Openstack-security] [Bug 1341954] Re: suds client subject to cache poisoning by local attacker References: <20140715043528.2209.47100.malonedeb@gac.canonical.com> Message-ID: <20141001074321.479.1425.launchpad@gac.canonical.com> ** Changed in: nova Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1341954 Title: suds client subject to cache poisoning by local attacker Status in Cinder: Fix Released Status in Cinder havana series: Fix Released Status in Cinder icehouse series: Fix Committed Status in Gantt: New Status in OpenStack Compute (Nova): Fix Released Status in Oslo VMware library for OpenStack projects: Fix Released Status in OpenStack Security Advisories: Won't Fix Status in OpenStack Security Notes: New Bug description: The suds project appears to be largely unmaintained upstream. The default cache implementation stores pickled objects to a predictable path in /tmp. This can be used by a local attacker to redirect SOAP requests via symlinks or run a privilege escalation / code execution attack via a pickle exploit. cinder/requirements.txt:suds>=0.4 gantt/requirements.txt:suds>=0.4 nova/requirements.txt:suds>=0.4 oslo.vmware/requirements.txt:suds>=0.4 The details are available here - https://bugzilla.redhat.com/show_bug.cgi?id=978696 (CVE-2013-2217) Although this is an unlikely attack vector steps should be taken to prevent this behaviour. Potential ways to fix this are by explicitly setting the cache location to a directory created via tempfile.mkdtemp(), disabling cache client.set_options(cache=None), or using a custom cache implementation that doesn't load / store pickled objects from an insecure location. To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1341954/+subscriptions From thierry.carrez+lp at gmail.com Wed Oct 1 13:54:08 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Wed, 01 Oct 2014 13:54:08 -0000 Subject: [Openstack-security] [Bug 1290486] Re: neutron-openvswitch-agent does not recreate flows after ovsdb-server restarts References: <20140310180245.8017.61086.malonedeb@soybean.canonical.com> Message-ID: <20141001135412.4829.39815.launchpad@wampee.canonical.com> ** Changed in: neutron Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1290486 Title: neutron-openvswitch-agent does not recreate flows after ovsdb-server restarts Status in OpenStack Neutron (virtual network service): Fix Released Status in neutron icehouse series: Fix Released Status in tripleo - openstack on openstack: Fix Released Bug description: The DHCP requests were not being responded to after they were seen on the undercloud network interface. The neutron services were restarted in an attempt to ensure they had the newest configuration and knew they were supposed to respond to the requests. Rather than using the heat stack create (called in devtest_overcloud.sh) to test, it was simple to use the following to directly boot a baremetal node. nova boot --flavor $(nova flavor-list | grep "|[[:space:]]*baremetal[[:space:]]*|" | awk '{print $2}) \ --image $(nova image-list | grep "|[[:space:]]*overcloud-control[[:space:]]*|" | awk '{print $2}') \ bm-test1 Whilst the baremetal node was attempting to pxe boot a restart of the neutron services was performed. This allowed the baremetal node to boot. It has been observed that a neutron restart was needed for each subsequent reboot of the baremetal nodes to succeed. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1290486/+subscriptions From 1315556 at bugs.launchpad.net Wed Oct 1 14:43:14 2014 From: 1315556 at bugs.launchpad.net (OpenStack Infra) Date: Wed, 01 Oct 2014 14:43:14 -0000 Subject: [Openstack-security] [Bug 1315556] Fix proposed to keystone (stable/icehouse) References: <20140502222034.18381.89762.malonedeb@chaenomeles.canonical.com> Message-ID: <20141001144314.18348.43418.malone@chaenomeles.canonical.com> Fix proposed to branch: stable/icehouse Review: https://review.openstack.org/125364 -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1315556 Title: Disabling a domain does not disable the projects in that domain Status in OpenStack Identity (Keystone): Fix Released Status in Keystone icehouse series: In Progress Bug description: User from an enabled domain can still get a token scoped to a project in a disabled domain. Steps to reproduce. 1. create domains "domainA" and "domainB" 2. create user "userA" and project "projectA" in "domainA" 3. create user "userB" and project "projectB" in "domainB" 4. assign "userA" some role for "projectB" 5. disable "domainB" 6. authenticate to get a token for "userA" scoped to "projectB". This should fail as "projectB"'s domain ("domainB") is disabled. Looks like the fix would be the check for the project domain to make sure it is also enabled. See https://github.com/openstack/keystone/blob/master/keystone/auth/controllers.py#L112 To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1315556/+subscriptions From 1315556 at bugs.launchpad.net Wed Oct 1 14:44:02 2014 From: 1315556 at bugs.launchpad.net (Dolph Mathews) Date: Wed, 01 Oct 2014 14:44:02 -0000 Subject: [Openstack-security] [Bug 1315556] Re: Disabling a domain does not disable the projects in that domain References: <20140502222034.18381.89762.malonedeb@chaenomeles.canonical.com> Message-ID: <20141001144403.25076.39559.launchpad@soybean.canonical.com> ** Also affects: keystone/icehouse Importance: Undecided Status: New ** Tags removed: havana-backport-potential icehouse-backport-potential security ** Changed in: keystone/icehouse Status: New => In Progress ** Changed in: keystone/icehouse Importance: Undecided => High ** Changed in: keystone/icehouse Assignee: (unassigned) => Dolph Mathews (dolph) -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1315556 Title: Disabling a domain does not disable the projects in that domain Status in OpenStack Identity (Keystone): Fix Released Status in Keystone icehouse series: In Progress Bug description: User from an enabled domain can still get a token scoped to a project in a disabled domain. Steps to reproduce. 1. create domains "domainA" and "domainB" 2. create user "userA" and project "projectA" in "domainA" 3. create user "userB" and project "projectB" in "domainB" 4. assign "userA" some role for "projectB" 5. disable "domainB" 6. authenticate to get a token for "userA" scoped to "projectB". This should fail as "projectB"'s domain ("domainB") is disabled. Looks like the fix would be the check for the project domain to make sure it is also enabled. See https://github.com/openstack/keystone/blob/master/keystone/auth/controllers.py#L112 To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1315556/+subscriptions From gerrit2 at review.openstack.org Thu Oct 2 01:01:17 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Thu, 02 Oct 2014 01:01:17 +0000 Subject: [Openstack-security] [openstack/keystone] SecurityImpact review request change I241ca72329f1ec9df778498b346d7b29c224d528 Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/117366 Log: commit 55503ecab21d2365c3b0b6c59421cbd79c35cbaf Author: Brant Knudson Date: Wed Aug 27 17:06:44 2014 -0500 pki/ssl_setup configurable digest The digest to use for pki_setup couldn't be configured. The value was `default`, which means that the digest was sha1. Some security standards require the digest to be stronger (SHA2), so making the digest configurable will allow deployments to be compliant. SecurityImpact DocImpact New `message_digest_algorithm` configuration options are added to the [signing] and [ssl] sections which default to `default`. Change-Id: I241ca72329f1ec9df778498b346d7b29c224d528 Closes-Bug: #1362343 From gerrit2 at review.openstack.org Thu Oct 2 01:01:23 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Thu, 02 Oct 2014 01:01:23 +0000 Subject: [Openstack-security] [openstack/keystone] SecurityImpact review request change I9e42c9bafc307ba1334fa641bab76f251722044d Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/117367 Log: commit 9ec6bd51f16823cec3fcf74e9cb2f7739af04701 Author: Brant Knudson Date: Wed Aug 27 17:11:06 2014 -0500 Change the default digest for pki/ssl_setup to sha256 The default digest was `default`, which meant that the digest was the openssl default of sha1. The default setting should be a SHA2 algorithm since this meets current security standards. This is for security hardening. SecurityImpact DocImpact The `default_message_digest` configuration options now default to `sha256` instead of `default`. Change-Id: I9e42c9bafc307ba1334fa641bab76f251722044d Related-Bug: #1362343 From gerrit2 at review.openstack.org Thu Oct 2 21:23:13 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Thu, 02 Oct 2014 21:23:13 +0000 Subject: [Openstack-security] [openstack/keystone] SecurityImpact review request change I241ca72329f1ec9df778498b346d7b29c224d528 Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/117366 Log: commit 090bedbb55862944c8298ee366821349969a6df9 Author: Brant Knudson Date: Wed Aug 27 17:06:44 2014 -0500 pki/ssl_setup configurable digest The digest to use for pki_setup couldn't be configured. The value was `default`, which means that the digest was sha1. Some security standards require the digest to be stronger (SHA2), so making the digest configurable will allow deployments to be compliant. SecurityImpact DocImpact New `message_digest_algorithm` configuration options are added to the [signing] and [ssl] sections which default to `default`. Change-Id: I241ca72329f1ec9df778498b346d7b29c224d528 Closes-Bug: #1362343 From gerrit2 at review.openstack.org Thu Oct 2 21:23:19 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Thu, 02 Oct 2014 21:23:19 +0000 Subject: [Openstack-security] [openstack/keystone] SecurityImpact review request change I9e42c9bafc307ba1334fa641bab76f251722044d Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/117367 Log: commit 58483551fcf360da11f595b9c7b39ff2d1d27896 Author: Brant Knudson Date: Wed Aug 27 17:11:06 2014 -0500 Change the default digest for pki/ssl_setup to sha256 The default digest was `default`, which meant that the digest was the openssl default of sha1. The default setting should be a SHA2 algorithm since this meets current security standards. This is for security hardening. SecurityImpact DocImpact The `default_message_digest` configuration options now default to `sha256` instead of `default`. Change-Id: I9e42c9bafc307ba1334fa641bab76f251722044d Related-Bug: #1362343 From bknudson at us.ibm.com Thu Oct 2 22:14:59 2014 From: bknudson at us.ibm.com (Brant Knudson) Date: Thu, 02 Oct 2014 22:14:59 -0000 Subject: [Openstack-security] [Bug 1329301] Re: Update how tokens are redacted References: <20140612121824.4650.65306.malonedeb@wampee.canonical.com> Message-ID: <20141002221500.24875.20573.launchpad@soybean.canonical.com> ** Also affects: python-keystoneclient Importance: Undecided Status: New ** Changed in: python-keystoneclient Assignee: (unassigned) => Brant Knudson (blk-u) ** Changed in: python-keystoneclient Status: New => In Progress -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1329301 Title: Update how tokens are redacted Status in Python client library for Glance: Fix Released Status in Python client library for Keystone: In Progress Bug description: We should move from this approach: https://review.openstack.org/#/c/83350/ to whatever cross-project approach is agreed upon: See this thread: http://lists.openstack.org/pipermail/openstack- dev/2014-June/037345.html To manage notifications about this bug go to: https://bugs.launchpad.net/python-glanceclient/+bug/1329301/+subscriptions From 1329301 at bugs.launchpad.net Thu Oct 2 22:56:32 2014 From: 1329301 at bugs.launchpad.net (Dolph Mathews) Date: Thu, 02 Oct 2014 22:56:32 -0000 Subject: [Openstack-security] [Bug 1329301] Re: Update how tokens are redacted from plaintext exposure References: <20140612121824.4650.65306.malonedeb@wampee.canonical.com> Message-ID: <20141002225632.17842.42353.launchpad@chaenomeles.canonical.com> ** Summary changed: - Update how tokens are redacted + Update how tokens are redacted from plaintext exposure ** Changed in: python-keystoneclient Importance: Undecided => Low ** Changed in: python-glanceclient Importance: Undecided => Low -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1329301 Title: Update how tokens are redacted from plaintext exposure Status in Python client library for Glance: Fix Released Status in Python client library for Keystone: In Progress Bug description: We should move from this approach: https://review.openstack.org/#/c/83350/ to whatever cross-project approach is agreed upon: See this thread: http://lists.openstack.org/pipermail/openstack- dev/2014-June/037345.html To manage notifications about this bug go to: https://bugs.launchpad.net/python-glanceclient/+bug/1329301/+subscriptions From 1341954 at bugs.launchpad.net Thu Oct 2 23:42:40 2014 From: 1341954 at bugs.launchpad.net (Adam Gandelman) Date: Thu, 02 Oct 2014 23:42:40 -0000 Subject: [Openstack-security] [Bug 1341954] Re: suds client subject to cache poisoning by local attacker References: <20140715043528.2209.47100.malonedeb@gac.canonical.com> Message-ID: <20141002234244.32158.88522.launchpad@gac.canonical.com> ** Changed in: cinder/icehouse Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1341954 Title: suds client subject to cache poisoning by local attacker Status in Cinder: Fix Released Status in Cinder havana series: Fix Released Status in Cinder icehouse series: Fix Released Status in Gantt: New Status in OpenStack Compute (Nova): Fix Released Status in Oslo VMware library for OpenStack projects: Fix Released Status in OpenStack Security Advisories: Won't Fix Status in OpenStack Security Notes: New Bug description: The suds project appears to be largely unmaintained upstream. The default cache implementation stores pickled objects to a predictable path in /tmp. This can be used by a local attacker to redirect SOAP requests via symlinks or run a privilege escalation / code execution attack via a pickle exploit. cinder/requirements.txt:suds>=0.4 gantt/requirements.txt:suds>=0.4 nova/requirements.txt:suds>=0.4 oslo.vmware/requirements.txt:suds>=0.4 The details are available here - https://bugzilla.redhat.com/show_bug.cgi?id=978696 (CVE-2013-2217) Although this is an unlikely attack vector steps should be taken to prevent this behaviour. Potential ways to fix this are by explicitly setting the cache location to a directory created via tempfile.mkdtemp(), disabling cache client.set_options(cache=None), or using a custom cache implementation that doesn't load / store pickled objects from an insecure location. To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1341954/+subscriptions From 1334926 at bugs.launchpad.net Thu Oct 2 23:47:44 2014 From: 1334926 at bugs.launchpad.net (Adam Gandelman) Date: Thu, 02 Oct 2014 23:47:44 -0000 Subject: [Openstack-security] [Bug 1334926] Re: floatingip still working once connected even after it is disociated References: <20140627021809.32583.22324.malonedeb@soybean.canonical.com> Message-ID: <20141002234748.5401.82442.launchpad@wampee.canonical.com> ** Changed in: neutron/icehouse Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1334926 Title: floatingip still working once connected even after it is disociated Status in OpenStack Neutron (virtual network service): Fix Committed Status in neutron icehouse series: Fix Released Status in OpenStack Security Notes: Fix Released Bug description: After we create an SSH connection to a VM via its floating ip, even though we have removed the floating ip association, we can still access the VM via that connection. Namely, SSH is not disconnected when the floating ip is not valid To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1334926/+subscriptions From thierry.carrez+lp at gmail.com Fri Oct 3 06:53:03 2014 From: thierry.carrez+lp at gmail.com (Thierry Carrez) Date: Fri, 03 Oct 2014 06:53:03 -0000 Subject: [Openstack-security] [Bug 1334926] Re: floatingip still working once connected even after it is disociated References: <20140627021809.32583.22324.malonedeb@soybean.canonical.com> Message-ID: <20141003065307.341.49530.launchpad@gac.canonical.com> ** Changed in: neutron Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1334926 Title: floatingip still working once connected even after it is disociated Status in OpenStack Neutron (virtual network service): Fix Released Status in neutron icehouse series: Fix Released Status in OpenStack Security Notes: Fix Released Bug description: After we create an SSH connection to a VM via its floating ip, even though we have removed the floating ip association, we can still access the VM via that connection. Namely, SSH is not disconnected when the floating ip is not valid To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1334926/+subscriptions From nkinder at redhat.com Fri Oct 3 20:29:43 2014 From: nkinder at redhat.com (Nathan Kinder) Date: Fri, 03 Oct 2014 20:29:43 -0000 Subject: [Openstack-security] [Bug 1337349] Re: Nova qemu hypervisor host smbios serial number is leaked to guest References: <20140703142824.27562.82896.malonedeb@gac.canonical.com> Message-ID: <20141003202944.5494.1355.malone@wampee.canonical.com> This issue has been published as OSSN-0028: https://wiki.openstack.org/wiki/OSSN/OSSN-0028 ** Changed in: ossn Status: In Progress => Fix Released -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1337349 Title: Nova qemu hypervisor host smbios serial number is leaked to guest Status in OpenStack Compute (Nova): Fix Released Status in OpenStack Security Advisories: Won't Fix Status in OpenStack Security Notes: Fix Released Bug description: Erwan Velu from eNovance reported a vulnerability in OpenStack Nova. The hypervisor is passing host system uuid (-smbios version) to guests, and this happen to be a critical info leak. The defect have been pinpointed to: https://github.com/openstack/nova/blob/master/nova/virt/libvirt/driver.py#L3054 From a simple virtual machine, this may allow numerous info leak like: Allow compute hardware enumeration from guests Deduce service tag and get all hardware configuration Ability to know if two instances are on the same compute Dell hardware is particulary impacted as : - the uuid encodes the service tag - the service tag can be used on support site to determine: - detailled hardware configuration - date & country where the hw was shipped - date & type of support contract - amount of servers bought during this shipment If there is no use case for this, we should scrambled that piece of information. To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1337349/+subscriptions From gerrit2 at review.openstack.org Sat Oct 4 10:32:52 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Sat, 04 Oct 2014 10:32:52 +0000 Subject: [Openstack-security] [openstack/nova] SecurityImpact review request change I0b8e6319a4cc39876b1e396ef705f0fc5def1e44 Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/126137 Log: commit cc88417637e4967860619e8d7e43f5d28957fcda Author: Sylvain Bauza Date: Mon Sep 29 13:33:50 2014 +0200 Fix unsafe SSL connection on TrustedFilter TrustedFilter was using httplib which doesn't check for CAs. Here the change is using Requests and verifies local CAs by default (or another one if provided) This effort is related to CVE 2013-2255. SecurityImpact Closes-Bug: #1373993 Change-Id: I0b8e6319a4cc39876b1e396ef705f0fc5def1e44 (cherry picked from commit 30871e8702737edbbfbcbbb5f21858873b37685c) From robert.clark at hp.com Sat Oct 4 11:48:52 2014 From: robert.clark at hp.com (Clark, Robert Graham) Date: Sat, 4 Oct 2014 11:48:52 +0000 Subject: [Openstack-security] Elections for OSSG lead Message-ID: Hi All, It gives me great pleasure to open the election process for OSSG leadership. This is the second time the OSSG has had the opportunity to elect leadership since the OSSG began nearly three years ago. The term for this position will begin at the Kilo Summit in Paris (November 2014) and end at the 'L' Summit in Vancouver (May 2015). The elected leader will be responsible for holding a new election to fill the OSSG Lead position for the following term. There are no term limits (an individual may be re-elected as many times as the community chooses). Any member of the election electorate (see wiki for details) can propose his/her candidacy for the same election. No nomination is required. They do so by sending an email to the openstack-security at lists.openstack.org mailing-list, using the subject: "OSSG Lead Candidacy". The email may include a description of the candidate platform. The candidacy is then confirmed by one of the election officials, after verification of the electorate status of the candidate. Please read more at the wiki entry here: http://wiki.openstack.org/wiki/Security/OSSG_Lead_Election_Fall_2014 Thank you all for being a part of the community and good luck to all the candidates! -Rob -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 6187 bytes Desc: not available URL: From 1174499 at bugs.launchpad.net Sat Oct 4 22:50:00 2014 From: 1174499 at bugs.launchpad.net (Akihiro Motoki) Date: Sat, 04 Oct 2014 22:50:00 -0000 Subject: [Openstack-security] [Bug 1174499] Re: Keystone token hashing is MD5 References: <20130429193226.5432.76936.malonedeb@wampee.canonical.com> Message-ID: <20141004225000.18243.83493.malone@chaenomeles.canonical.com> The required fix in Horizon side is just an update of the example settings file and the documentation of the new parameter. Thus I think it is a good candidate for Juno-RC2 (we already plan RC2 for translation import). ** Tags added: juno-rc-potential -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1174499 Title: Keystone token hashing is MD5 Status in Django OpenStack Auth: Fix Released Status in OpenStack Dashboard (Horizon): In Progress Status in OpenStack Identity (Keystone): Fix Released Status in OpenStack API documentation site: Confirmed Status in Python client library for Keystone: Fix Released Bug description: https://github.com/openstack/python- keystoneclient/blob/master/keystoneclient/common/cms.py def cms_hash_token(token_id): """ return: for ans1_token, returns the hash of the passed in token otherwise, returns what it was passed in. """ if token_id is None: return None if is_ans1_token(token_id): hasher = hashlib.md5() hasher.update(token_id) return hasher.hexdigest() else: return token_id MD5 is a deprecated mechanism, it should be replaces with at least SHA1, if not SHA256. Keystone should be able to support multiple Hash types, and the auth_token middleware should query Keystone to find out which type is in use. To manage notifications about this bug go to: https://bugs.launchpad.net/django-openstack-auth/+bug/1174499/+subscriptions From fungi at yuggoth.org Mon Oct 6 14:42:22 2014 From: fungi at yuggoth.org (Jeremy Stanley) Date: Mon, 06 Oct 2014 14:42:22 -0000 Subject: [Openstack-security] [Bug 1375599] Re: Cinder should not publish sensitive data such as user token in notifications. References: <20140930070610.4767.44598.malonedeb@wampee.canonical.com> Message-ID: <20141006144224.18243.42414.launchpad@chaenomeles.canonical.com> ** Tags added: security ** Changed in: ossa Status: Incomplete => Won't Fix ** Information type changed from Public Security to Public -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1375599 Title: Cinder should not publish sensitive data such as user token in notifications. Status in Cinder: New Status in OpenStack Security Advisories: Won't Fix Bug description: Here is a message captured in rabbitmq: ctxt: {u'domain': None, u'project_name': u'admin', u'user_id': u'f6fafd3282a841849a01beeb80fd3161', u'roles': [u'heat_stack_owner', u'_member_', u'admin'], u'user_identity': u'f6fafd3282a841849a01beeb80fd3161 d6acdbfa2bba426c912f214c665e78d9 - - -', u'project_domain': None, u'timestamp': u'2014-09-25T07:01:02.936829', u'auth_token': u'bac7c01f4eb1412b841ab819ceddc5ad', u'remote_address': u'19.0.0.99', u'quota_class': None, u'project_id': u'd6acdbfa2bba426c912f214c665e78d9', u'is_admin': True, u'user': u'f6fafd3282a841849a01beeb80fd3161', u'service_catalog': [{u'endpoints': [{u'adminURL': u'http://19.0.0.99:8774/v2/d6acdbfa2bba426c912f214c665e78d9', u'region': u'RegionOne', u'internalURL': u'http://19.0.0.99:8774/v2/d6acdbfa2bba426c912f214c665e78d9', u'publicURL': u'http://19.0.0.99:8774/v2/d6acdbfa2bba426c912f214c665e78d9'}], u'type': u'compute', u'name': u'nova'}], u'request_id': u'req-623ecb62-0660-4264-b0d3-04eb13f54914', u'user_domain': None, u'read_deleted': u'no', u'tenant': u'd6acdbfa2bba426c912f214c665e78d9'} publisher_id: volume.aj-celiometer at lvmdriver-1 event_type: volume.delete.end payload: {u'status': u'deleting', u'instance_uuid': None, u'user_id': u'f6fafd3282a841849a01beeb80fd3161', u'availability_zone': u'nova', u'tenant_id': u'd6acdbfa2bba426c912f214c665e78d9', u'created_at': u'2014-09-24 14:11:42', u'snapshot_id': None, u'volume_type': u'0bc2a44a-fd19-4448-8399-1538fc8724e5', u'host': u'aj-celiometer at lvmdriver-1#lvmdriver-1', u'replication_status': u'disabled', u'volume_id': u'25102eee-9e82-4ba8-8f8c-17bc52c6519f', u'replication_extended_status': None, u'replication_driver_data': None, u'size': 1, u'launched_at': u'2014-09-24 14:11:42', u'display_name': None} metadata: {'timestamp': u'2014-09-25 07:01:19.271715', 'message_id': u'9c77a382-05c2-4014-a1a9-cbc41b2d2eb7'} To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1375599/+subscriptions From fungi at yuggoth.org Mon Oct 6 14:52:39 2014 From: fungi at yuggoth.org (Jeremy Stanley) Date: Mon, 06 Oct 2014 14:52:39 -0000 Subject: [Openstack-security] [Bug 1372643] Re: MITM vulnerability with XIV driver References: <20140922204545.32411.9337.malonedeb@gac.canonical.com> Message-ID: <20141006145239.25513.51490.malone@soybean.canonical.com> This looks like another in the vein of bug 1188189 which we've so far considered a security hardening opportunity, no advisory warranted. ** Information type changed from Private Security to Public ** Tags added: security ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1372643 Title: MITM vulnerability with XIV driver Status in Cinder: New Status in OpenStack Security Advisories: Won't Fix Bug description: The XIV driver in Juno appears to blindly trust whatever certificate it gets back from the device without any validation. This would leave it open to a MITM attack. To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1372643/+subscriptions From fungi at yuggoth.org Mon Oct 6 15:51:53 2014 From: fungi at yuggoth.org (Jeremy Stanley) Date: Mon, 06 Oct 2014 15:51:53 -0000 Subject: [Openstack-security] [Bug 1372643] Re: MITM vulnerability with XIV driver References: <20140922204545.32411.9337.malonedeb@gac.canonical.com> Message-ID: <20141006155153.25282.39843.malone@soybean.canonical.com> Granted the position is worth revisiting. Are we to the point where we're ready as a project to declare victory on bug 1188189 now and consider anything else which doesn't encrypt internal communications or fails to validate server certificates (for SSL sockets, SSH, et cetera) a surprise to the community and worth individual security advisories and mandatory stable backports going forward? -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1372643 Title: MITM vulnerability with XIV driver Status in Cinder: New Status in OpenStack Security Advisories: Won't Fix Bug description: The XIV driver in Juno appears to blindly trust whatever certificate it gets back from the device without any validation. This would leave it open to a MITM attack. To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1372643/+subscriptions From 1163569 at bugs.launchpad.net Mon Oct 6 16:39:51 2014 From: 1163569 at bugs.launchpad.net (Doug Chivers) Date: Mon, 06 Oct 2014 16:39:51 -0000 Subject: [Openstack-security] [Bug 1163569] Re: security groups don't work with vip and ovs plugin References: <20130402204346.20639.18981.malonedeb@wampee.canonical.com> Message-ID: <20141006163954.32158.55127.launchpad@gac.canonical.com> ** Changed in: ossn Assignee: (unassigned) => Doug Chivers (doug-chivers) ** Changed in: ossn Importance: Undecided => High ** Changed in: ossn Status: New => In Progress -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1163569 Title: security groups don't work with vip and ovs plugin Status in OpenStack Neutron (virtual network service): In Progress Status in OpenStack Security Notes: In Progress Bug description: http://codepad.org/xU8G4s00 I pinged nachi and he suggested to try using: interface_driver = quantum.agent.linux.interface.BridgeInterfaceDriver But after setting this it seems like the vip does not work at all. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1163569/+subscriptions From 1174499 at bugs.launchpad.net Mon Oct 6 16:48:18 2014 From: 1174499 at bugs.launchpad.net (OpenStack Infra) Date: Mon, 06 Oct 2014 16:48:18 -0000 Subject: [Openstack-security] [Bug 1174499] Re: Keystone token hashing is MD5 References: <20130429193226.5432.76936.malonedeb@wampee.canonical.com> Message-ID: <20141006164818.32642.76511.malone@gac.canonical.com> Reviewed: https://review.openstack.org/116510 Committed: https://git.openstack.org/cgit/openstack/horizon/commit/?id=372d033d89c0f5d305959a6ad5fd3e1159cc91ed Submitter: Jenkins Branch: master commit 372d033d89c0f5d305959a6ad5fd3e1159cc91ed Author: Brant Knudson Date: Sun Aug 24 10:04:10 2014 -0500 Document token hash algorithm option With https://review.openstack.org/#/c/116509/ , django-openstack-auth will support a new option for the token hash algorithm. This adds the documentation to Horizon's local settings example file. This is for security hardening. The token hash algorithm defaults to MD5, which is considered too weak due to the potential for hash collisions. Some security standards require a SHA2 hash algorithm to be used. DocImpact SecurityImpact Change-Id: I6774b9b7215d191259586e4721e357487bb777cd Closes-Bug: #1174499 ** Changed in: horizon Status: In Progress => Fix Committed -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1174499 Title: Keystone token hashing is MD5 Status in Django OpenStack Auth: Fix Released Status in OpenStack Dashboard (Horizon): Fix Committed Status in OpenStack Identity (Keystone): Fix Released Status in OpenStack API documentation site: Confirmed Status in Python client library for Keystone: Fix Released Bug description: https://github.com/openstack/python- keystoneclient/blob/master/keystoneclient/common/cms.py def cms_hash_token(token_id): """ return: for ans1_token, returns the hash of the passed in token otherwise, returns what it was passed in. """ if token_id is None: return None if is_ans1_token(token_id): hasher = hashlib.md5() hasher.update(token_id) return hasher.hexdigest() else: return token_id MD5 is a deprecated mechanism, it should be replaces with at least SHA1, if not SHA256. Keystone should be able to support multiple Hash types, and the auth_token middleware should query Keystone to find out which type is in use. To manage notifications about this bug go to: https://bugs.launchpad.net/django-openstack-auth/+bug/1174499/+subscriptions From fungi at yuggoth.org Mon Oct 6 19:33:19 2014 From: fungi at yuggoth.org (Jeremy Stanley) Date: Mon, 06 Oct 2014 19:33:19 -0000 Subject: [Openstack-security] [Bug 1372643] Re: MITM vulnerability with XIV driver References: <20140922204545.32411.9337.malonedeb@gac.canonical.com> Message-ID: <20141006193321.479.12331.launchpad@gac.canonical.com> ** Changed in: cinder Assignee: (unassigned) => Alon Marx (alonma) ** Changed in: ossa Assignee: Alon Marx (alonma) => (unassigned) -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1372643 Title: MITM vulnerability with XIV driver Status in Cinder: New Status in OpenStack Security Advisories: Won't Fix Bug description: The XIV driver in Juno appears to blindly trust whatever certificate it gets back from the device without any validation. This would leave it open to a MITM attack. To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1372643/+subscriptions From gerrit2 at review.openstack.org Mon Oct 6 22:31:27 2014 From: gerrit2 at review.openstack.org (gerrit2 at review.openstack.org) Date: Mon, 06 Oct 2014 22:31:27 +0000 Subject: [Openstack-security] [openstack/nova] SecurityImpact review request change I8e46d41164e9478b820cad569ba82f25de244620 Message-ID: Hi, I'd like you to take a look at this patch for potential SecurityImpact. https://review.openstack.org/124296 Log: commit 789ad9cba93bc264ee0e89db5be40b26dece9872 Author: melanie witt Date: Fri Sep 26 05:15:16 2014 +0000 replace httplib.HTTPSConnection in EC2KeystoneAuth httplib.HTTPSConnection is known to not verify SSL certificates in Python 2.x. This change replaces use of httplib.HTTPSConnection with the requests module. It imports config settings related to SSL verification: ssl.key_file, ssl.cert_file, and ssl.ca_file. It also adds one config setting: keystone_ec2_insecure. By default, SSL verification is on, but can be disabled by setting: keystone_ec2_insecure=true This patch is based on the keystone middleware ec2 token patch: https://review.openstack.org/#/c/76476 SecurityImpact DocImpact Closes-Bug: #1373992 Change-Id: I8e46d41164e9478b820cad569ba82f25de244620 From sam at code-smash.net Wed Oct 1 11:55:29 2014 From: sam at code-smash.net (Sam Betts) Date: Wed, 01 Oct 2014 11:55:29 -0000 Subject: [Openstack-security] [Bug 1369876] Re: Missing HttpOnly Attribute in Session Cookie References: <20140916064453.32545.92390.malonedeb@gac.canonical.com> Message-ID: <20141001115529.25484.1253.malone@soybean.canonical.com> As far as I can tell in master right now SESSION_COOKIE_HTTPONLY = True which should add httponly to all session cookies. -- You received this bug notification because you are a member of OpenStack Security Group, which is subscribed to OpenStack. https://bugs.launchpad.net/bugs/1369876 Title: Missing HttpOnly Attribute in Session Cookie Status in OpenStack Dashboard (Horizon): Confirmed Bug description: Affected URL: https://Ip_address/admin/ Entity: csrftoken (Cookie) Risk: It is possible to steal or manipulate customer session and cookies, which might be used to impersonate a legitimate user, allowing the hacker to view or alter user records, and to perform transactions as that user. Causes: The web application sets session cookies without the HttpOnly attribute Recommend Fix: Add the 'HttpOnly' attribute to all session cookies. The Test Requests and Responses: GET /admin/ HTTP/1.1 Host: 9.5.29.52 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Firefox/24.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: https://9.5.29.52/ Cookie: csrftoken=JPjBiDp6Ex6YDw3sgfZPCTPUwWKZdZTm; sessionid=oad3bpy15qm8ntml9wx604yr79cc6zpb Connection: keep-alive HTTP/1.1 200 OK Date: Fri, 12 Sep 2014 07:52:50 GMT Server: Apache Vary: Accept-Language,Cookie,Accept-Encoding X-Frame-Options: SAMEORIGIN Content-Language: en Keep-Alive: timeout=5, max=100 Connection: Keep-Alive 2014/9/12 504 Transfer-Encoding: chunked Content-Type: text/html Set-Cookie: csrftoken=silTP6ARbLvXohF6YYFLlWHce0KZkjPy; expires=Fri, 11-Sep-2015 07:52:52 GMT; Max-Age=31449600; Path=/; secure Set-Cookie: sessionid=ygq094phgr6og471j6n0asq7x6q37j6n; httponly; Path=/; secure Usage Overview - Cloud Management Dashboard