revocation list should not be a protected resource

Bug #1211602 reported by Morgan Fainberg
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
OpenStack Identity (keystone)
Won't Fix
Wishlist
Unassigned

Bug Description

The Revocation List resources should not be protected. The Revocation list is akin to a CRL and likely should be available for public consumption as a CRL would be.

Resources are:
v3: /auth/tokens/OS-PKI/revoked
v2: /tokens/revoked

Adam Young (ayoung)
Changed in keystone:
assignee: nobody → Adam Young (ayoung)
Revision history for this message
Adam Young (ayoung) wrote :

Yes, but to expose it in its current form, it will leak tokens that, while revoked, might not yet be identified as such by a service. There will be a window in which a revoked token will be usable, and this open a security vulnerability.

We are goint to redo the revocation in Icehouse timeframe.

Changed in keystone:
importance: Undecided → Wishlist
status: New → Confirmed
Revision history for this message
Dolph Mathews (dolph) wrote :

I agree with Adam - we could freely publish a revocation list of access tokens, but not bearer tokens. Revocation events (user_id + tenant_id + timestamp) or something similar *could* also be published for unauthenticated users.

Revision history for this message
Dolph Mathews (dolph) wrote :

Unassigning due to inactivity.

Changed in keystone:
assignee: Adam Young (ayoung) → nobody
Changed in keystone:
assignee: nobody → Juan Antonio Osorio Robles (juan-osorio-robles)
Changed in keystone:
assignee: Juan Antonio Osorio Robles (juan-osorio-robles) → nobody
Adam Young (ayoung)
Changed in keystone:
status: Confirmed → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.