[Openstack-security] Openstack-security Digest, Vol 36, Issue 14
Kenny Aondona
run2obtain at gmail.com
Wed Feb 24 13:30:04 UTC 2016
Hi everyone,
I was just wondering about this and thought it wise to ask. Asides this
list, is there a way to pull openstack security bugs and advisories/reports
programmatically maybe in json format ? This feature could be useful for
security automation etc.
Thanks,
Ken
On Wed, Feb 24, 2016, 13:01 <openstack-security-request at lists.openstack.org>
wrote:
> Send Openstack-security mailing list submissions to
> openstack-security at lists.openstack.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
>
> or, via email, send a message with subject or body 'help' to
> openstack-security-request at lists.openstack.org
>
> You can reach the person managing the list at
> openstack-security-owner at lists.openstack.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Openstack-security digest..."
>
>
> Today's Topics:
>
> 1. [Bug 1455582] Re: Hypervisor compromise may result in
> malicious trust creation (Dolph Mathews)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Tue, 23 Feb 2016 15:00:22 -0000
> From: Dolph Mathews <1455582 at bugs.launchpad.net>
> To: openstack-security at lists.openstack.org
> Subject: [Openstack-security] [Bug 1455582] Re: Hypervisor compromise
> may result in malicious trust creation
> Message-ID:
> <20160223150022.1606.60774.malone at chaenomeles.canonical.com>
> Content-Type: text/plain; charset="utf-8"
>
> Closing this because bearer tokens, etc, are a well known weakness.
>
> ** Changed in: keystone
> Status: Confirmed => Won't Fix
>
> --
> You received this bug notification because you are a member of OpenStack
> Security, which is subscribed to OpenStack.
> https://bugs.launchpad.net/bugs/1455582
>
> Title:
> Hypervisor compromise may result in malicious trust creation
>
> Status in OpenStack Identity (keystone):
> Won't Fix
> Status in OpenStack Security Advisory:
> Won't Fix
> Status in OpenStack Security Notes:
> Fix Released
>
> Bug description:
>
> If a hypervisor is compromised, and the hypervisor is a a Nova compute
> node, the end user now has access to every token that passes through that
> node.
>
> By default, a keystone token can be exchanged for another token. There
> is no restriction on scoping of the new token. A scoped token can be
> exchanged for an unscoped token, or a token scoped to a different
> project.
>
> We had set the default time limit for tokens down to 1 hour, to reduce
> the surface area of the attack. However, many workloads require a
> single token for the whole workload, and these workloads take more
> than one hour, so several installations have increased token lifespans
> back to the old value of 24 hours.
>
> A token can be used to change a password. If this is done, all tokens
> are revoked for the user.
>
> With the trust API, a user can set up a long term delegation that
> allows another user to perform an operation on their behalf. While
> tokens created via trusts are limited in what they can do, the
> limitations are only on things like change passwords or create a new
> token.
>
> Thus, if an attacker compromises a compute node and harvests tokens,
> the highest value attack for them is to automatically create a trust
> from the compromised user to some other account. This bypasses the
> time limitation of the token expiration, and will allow the attacker
> to perform operations on the users resources at the attackers
> convenience.
>
> Any site that is running a recent version of Heat would be expected to
> have many trusts set up from the customer user accounts to the Heat
> service user. Heat creates trusts using the users tokens, so we know
> this approach is not just theoretical, but actively used.
>
> This leaves a fairly obvious trail, in that a user can see all of the
> trusts created with the user as the trustor. Any trusts that do not
> have a Heat user as the trustee are suspect. It might even be
> possible to compromise Heat users, so even those should be audited.
>
> There are other ways that a harvested token can be abused, but the
> trust approach is the one I find the most worrysome, as it could be
> done as a "sleeper" agent.
>
> The same issues apply to the OAUTH1.0a extension.
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/keystone/+bug/1455582/+subscriptions
>
>
>
> ------------------------------
>
> _______________________________________________
> Openstack-security mailing list
> Openstack-security at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
>
>
> End of Openstack-security Digest, Vol 36, Issue 14
> **************************************************
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-security/attachments/20160224/4ca1e537/attachment.html>
More information about the Openstack-security
mailing list