[Openstack-security] [Bug 1268751] Related fix merged to keystone (master)
OpenStack Infra
1268751 at bugs.launchpad.net
Tue Nov 29 17:15:43 UTC 2016
Reviewed: https://review.openstack.org/399728
Committed: https://git.openstack.org/cgit/openstack/keystone/commit/?id=df721d05bfa4c69f8540d6051912d2430ed06213
Submitter: Jenkins
Branch: master
commit df721d05bfa4c69f8540d6051912d2430ed06213
Author: “Richard <csravelar at gmail.com>
Date: Fri Nov 18 18:25:07 2016 +0000
Don't invalidate all user tokens of roleless group
As discussed in [1], deleting a group invalidates all user tokens
which can flood the revocation event table if the deleted group
contained thousands of users in the group. This happens regardless
of whether the group had any role assignment or not. This patch makes
it so that only groups that had role assignments to a project or
domain can then invalidate user tokens, otherwise there is no need
to revoke each user token because the group was not assigned any form
of authorization to begin with.
[1]: https://bugs.launchpad.net/keystone/+bug/1268751
Related-Bug: #1268751
Change-Id: I22ad364cb4737df3ed086f78310f75f3099ab4c1
--
You received this bug notification because you are a member of OpenStack
Security, which is subscribed to OpenStack.
https://bugs.launchpad.net/bugs/1268751
Title:
Potential token revocation abuse via group membership
Status in OpenStack Identity (keystone):
Won't Fix
Status in OpenStack Security Advisory:
Won't Fix
Status in OpenStack Security Notes:
Fix Released
Bug description:
If a group is deleted, all tokens for all users that are a member of
that group are revoked. This leads to potential abuse:
1. A group admin adds a user to a group without users knowledge
2. User creates token
3. Admin deletes group.
4. All of the users tokens are revoked.
Admittedly, this abuse must be instigated by a group admin, which is
the global admin in the default policy file, but an alternative policy
file could allow for the delegation of "add user to group" behavior.
In such a system, this could act as a denial of service attack for a
set of users.
To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1268751/+subscriptions
More information about the Openstack-security
mailing list