[Openstack-security] [Bug 1299039] Re: Token Scoping
Adam Young
1299039 at bugs.launchpad.net
Tue Apr 1 21:20:52 UTC 2014
It would break Horizon.
On initial login, Horizon passes user id and password to the V2 API. If
no tenant is specified, it gets s token scoped to the default tenant.
Even if it didn't, however, Horizon only holds on to the last token ,
and revokes all eralier, so you would break the ability to go from
project to project.
--
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1299039
Title:
Token Scoping
Status in OpenStack Identity (Keystone):
Triaged
Bug description:
In Havana Stable release for both V2.0 an V3,
A scoped token can be used to get another scoped or un-scopped token.
This can be exploited by anyone who has gained access to a scoped
token.
For example,
1. userA is related to two projects: Project1, Project2
2. userA creates tokenA scoped by Project1
3. userA shares the tokenA to a third party (malicious).
4. Third party can now make a token creation call to create a new tokenB scoped under projectB using tokenA.
Although, we know that bearer token has all or nothing property, scoping the token can limit the exposure.
A scoped token should not be allowed to create another scoped token.
To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1299039/+subscriptions
More information about the Openstack-security
mailing list