[Openstack-security] [Bug 1174499] Re: Keystone token hashing is MD5
Adam Young
1174499 at bugs.launchpad.net
Fri Aug 22 14:23:51 UTC 2014
Yes, Horizon needs some chane, and I am not certain what the best
approach is. Ideally, Horizon would get the Keystone configuration
option, but Keystone has no way of publishing it to a remote server.
The "Pass a hash" approach for Horizon was never intended to be a long
term solution, and so I'm reluctant to put too much effort in to making
it even more usable. I suspect that the best compromise is a
configuration field for Horizon to establish the hash algorithm to use.
--
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1174499
Title:
Keystone token hashing is MD5
Status in OpenStack Dashboard (Horizon):
New
Status in OpenStack Identity (Keystone):
Fix Released
Status in OpenStack API documentation site:
Confirmed
Status in Python client library for Keystone:
Fix Released
Bug description:
https://github.com/openstack/python-
keystoneclient/blob/master/keystoneclient/common/cms.py
def cms_hash_token(token_id):
"""
return: for ans1_token, returns the hash of the passed in token
otherwise, returns what it was passed in.
"""
if token_id is None:
return None
if is_ans1_token(token_id):
hasher = hashlib.md5()
hasher.update(token_id)
return hasher.hexdigest()
else:
return token_id
MD5 is a deprecated mechanism, it should be replaces with at least SHA1, if not SHA256.
Keystone should be able to support multiple Hash types, and the auth_token middleware should query Keystone to find out which type is in use.
To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1174499/+subscriptions
More information about the Openstack-security
mailing list