[Openstack-security] [Bug 1287301] Re: Keystone client token cache doesn't respect revoked tokens
Matthew Edmonds
edmondsw at us.ibm.com
Wed Mar 12 16:35:15 UTC 2014
setting a higher value for token_cache_time and a lower value for
revocation_cache_time (assuming we start using the revocation list here
as proposed by https://review.openstack.org/#/c/78241/) would allow you
to gain the performance improvement of not having to re-request tokens
as often while satisfying the security requirement that revocation take
effect in a timely manner. Yes, the revocation list is being requested
more frequently, and may offset some of the performance gains from
caching tokens. But the revocation list can be used to validate any
token, so multiple tokens could be validated over the life of the cached
revocation list, instead of each token validation requiring a call back
to keystone should token_cache_time be similarly reduced.
--
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1287301
Title:
Keystone client token cache doesn't respect revoked tokens
Status in OpenStack Security Advisories:
Invalid
Status in Python client library for Keystone:
In Progress
Bug description:
If we'll enable caching for keystoneclient tokens we'll be able to use
tokens that are already revoked if they are present in cache:
https://github.com/openstack/python-
keystoneclient/blob/0.6.0/keystoneclient/middleware/auth_token.py#L831
steps to recreate:
1) get a token
2) use it to make a request via keystoneclient using default properties (thus it will be cached)
3) delete the token
4) use the token to make another request via keystoneclient
expected result: the token should not work (HTTP 401)
actual result: the token still works
To manage notifications about this bug go to:
https://bugs.launchpad.net/ossa/+bug/1287301/+subscriptions
More information about the Openstack-security
mailing list