[Openstack-security] [Bug 1188189] Re: Some server-side 'SSL' communication fails to check certificates (use of HTTPSConnection)

Jeremy Stanley fungi at yuggoth.org
Tue Mar 24 12:54:41 UTC 2015


While I agree that secure defaults are preferable, even if only to
provide a good example to operators and prove that we as a project are
doing all we can to keep them and their users safe, from what I've seen
in the field most will be disinterested in running a CA or purchasing
and tracking certificates for the various bits of hardware to which
these drivers are communicating.

The additional complexity and liability of spontaneous breakage from
certificate expiration often outweighs concerns over attacks by
malicious entities infiltrating an isolated management network in ways
which internal server-to-server and driver-to-hardware HTTPS might
mitigate.

I appreciate the degree to which our developers already make security a
priority in our software, and recognize that sometimes user demands for
other fixes and features pragmatically outweigh some particular security
improvements in the absence of specific developers focused on driving
and implementing the latter.

-- 
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1188189

Title:
  Some server-side 'SSL' communication fails to check certificates (use
  of HTTPSConnection)

Status in Cinder:
  In Progress
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Neutron (virtual network service):
  In Progress
Status in Oslo VMware library for OpenStack projects:
  Fix Released
Status in OpenStack Security Advisories:
  Won't Fix
Status in OpenStack Security Notes:
  Fix Released
Status in Python client library for Keystone:
  Fix Released
Status in OpenStack Object Storage (Swift):
  Invalid

Bug description:
  Grant Murphy from Red Hat reported usage of httplib.HTTPSConnection
  objects. In Python 2.x those do not perform CA checks so client
  connections are vulnerable to MiM attacks.

  """
  The following files use httplib.HTTPSConnection :
  keystone/middleware/s3_token.py
  keystone/middleware/ec2_token.py
  keystone/common/bufferedhttp.py
  vendor/python-keystoneclient-master/keystoneclient/middleware/auth_token.py

  AFAICT HTTPSConnection does not validate server certificates and
  should be avoided. This is fixed in Python 3, however in 2.X no
  validation occurs. I suspect this is also applicable to most OpenStack
  modules that make HTTPS client calls.

  Similar problems were found in ovirt:
  https://bugzilla.redhat.com/show_bug.cgi?id=851672 (CVE-2012-3533)

  With solutions for ovirt:
  http://gerrit.ovirt.org/#/c/7209/
  http://gerrit.ovirt.org/#/c/7249/
  """

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1188189/+subscriptions




More information about the Openstack-security mailing list