[Openstack-security] [Bug 1188189] Re: Some server-side 'SSL' communication fails to check certificates (use of HTTPSConnection)
Jeremy Stanley
fungi at yuggoth.org
Tue Mar 24 12:54:41 UTC 2015
While I agree that secure defaults are preferable, even if only to
provide a good example to operators and prove that we as a project are
doing all we can to keep them and their users safe, from what I've seen
in the field most will be disinterested in running a CA or purchasing
and tracking certificates for the various bits of hardware to which
these drivers are communicating.
The additional complexity and liability of spontaneous breakage from
certificate expiration often outweighs concerns over attacks by
malicious entities infiltrating an isolated management network in ways
which internal server-to-server and driver-to-hardware HTTPS might
mitigate.
I appreciate the degree to which our developers already make security a
priority in our software, and recognize that sometimes user demands for
other fixes and features pragmatically outweigh some particular security
improvements in the absence of specific developers focused on driving
and implementing the latter.
--
You received this bug notification because you are a member of OpenStack
Security Group, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1188189
Title:
Some server-side 'SSL' communication fails to check certificates (use
of HTTPSConnection)
Status in Cinder:
In Progress
Status in OpenStack Identity (Keystone):
Fix Released
Status in OpenStack Neutron (virtual network service):
In Progress
Status in Oslo VMware library for OpenStack projects:
Fix Released
Status in OpenStack Security Advisories:
Won't Fix
Status in OpenStack Security Notes:
Fix Released
Status in Python client library for Keystone:
Fix Released
Status in OpenStack Object Storage (Swift):
Invalid
Bug description:
Grant Murphy from Red Hat reported usage of httplib.HTTPSConnection
objects. In Python 2.x those do not perform CA checks so client
connections are vulnerable to MiM attacks.
"""
The following files use httplib.HTTPSConnection :
keystone/middleware/s3_token.py
keystone/middleware/ec2_token.py
keystone/common/bufferedhttp.py
vendor/python-keystoneclient-master/keystoneclient/middleware/auth_token.py
AFAICT HTTPSConnection does not validate server certificates and
should be avoided. This is fixed in Python 3, however in 2.X no
validation occurs. I suspect this is also applicable to most OpenStack
modules that make HTTPS client calls.
Similar problems were found in ovirt:
https://bugzilla.redhat.com/show_bug.cgi?id=851672 (CVE-2012-3533)
With solutions for ovirt:
http://gerrit.ovirt.org/#/c/7209/
http://gerrit.ovirt.org/#/c/7249/
"""
To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1188189/+subscriptions
More information about the Openstack-security
mailing list