[Openstack-security] [Bug 1004114] Re: Password logging
OpenStack Infra
1004114 at bugs.launchpad.net
Mon Aug 4 06:53:20 UTC 2014
Reviewed: https://review.openstack.org/110117
Committed: https://git.openstack.org/cgit/openstack/python-keystoneclient/commit/?id=605577192d7158ecf40bd9a94b7cf3acc2ce1c95
Submitter: Jenkins
Branch: master
commit 605577192d7158ecf40bd9a94b7cf3acc2ce1c95
Author: Brant Knudson <bknudson at us.ibm.com>
Date: Mon Jul 28 14:34:53 2014 -0500
Redact tokens in request headers
Tokens shouldn't be logged since a token could be gathered from a
log file and used. The client was logging the X-Auth-Token and
X-Subject-Token request headers. With this change, the X-Auth-Token
and X-Subject-Token are shown as "TOKEN_REDACTED".
Also, the "Authentication" header is also redacted.
This is for security hardening.
SecurityImpact
Closes-Bug: #1004114
Closes-Bug: #1327019
Change-Id: I1edc3821ed028471102cc9b95eb9f3b54c9e2778
** Changed in: python-keystoneclient
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1004114
Title:
Password logging
Status in OpenStack Dashboard (Horizon):
Fix Released
Status in OpenStack Identity (Keystone):
Fix Released
Status in OpenStack Security Notes:
New
Status in Python client library for Keystone:
Fix Committed
Bug description:
When the log level is set to DEBUG, keystoneclient's full-request
logging mechanism kicks in, exposing plaintext passwords, etc.
This bug is mostly out of the scope of Horizon, however Horizon can
also be more secure in this regard. We should make sure that wherever
we *are* handling sensitive data we use Django's error report
filtering mechanisms so they don't appear in tracebacks, etc.
(https://docs.djangoproject.com/en/dev/howto/error-reporting
/#filtering-error-reports)
Keystone may also want to look at respecting such annotations in their
logging mechanism, i.e. if Django were properly annotating these data
objects, keystoneclient could check for those annotations and properly
sanitize the log output.
If not this exact mechanism, then something similar would be wise.
For the time being, it's also worth documenting in both projects that
a log level of DEBUG will log passwords in plain text.
To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1004114/+subscriptions
More information about the Openstack-security
mailing list