Activity log for bug #1490804

Date Who What changed Old value New value Message
2015-09-01 03:08:48 Liusheng bug added bug
2015-09-01 11:49:07 Tristan Cacqueray bug task added ossa
2015-09-01 11:49:13 Tristan Cacqueray ossa: status New Incomplete
2015-09-01 12:00:26 Tristan Cacqueray bug added subscriber Keystone Core security contacts
2015-09-01 12:44:00 Jeremy Stanley description A keystone token which has been revoked can still be used by manipulating particular byte fields within the token. When a Keystone token is revoked it is added to the revoked list which stores the exact token value. Any API will look at the token to see whether or not it should accept a token. By changing a single byte within the token, the revocation can be bypassed. see the testing script [1]. It is suggested that the revocation should be changed to only check the token's inner ID. [1] http://paste.openstack.org/show/436516/ This issue is being treated as a potential security risk under embargo. Please do not make any public mention of embargoed (private) security vulnerabilities before their coordinated publication by the OpenStack Vulnerability Management Team in the form of an official OpenStack Security Advisory. This includes discussion of the bug or associated fixes in public forums such as mailing lists, code review systems and bug trackers. Please also avoid private disclosure to other individuals not already approved for access to this information, and provide this same reminder to those who are made aware of the issue prior to publication. All discussion should remain confined to this private bug report, and any proposed fixes should be added to the bug as attachments. A keystone token which has been revoked can still be used by manipulating particular byte fields within the token. When a Keystone token is revoked it is added to the revoked list which stores the exact token value. Any API will look at the token to see whether or not it should accept a token. By changing a single byte within the token, the revocation can be bypassed. see the testing script [1]. It is suggested that the revocation should be changed to only check the token's inner ID. [1] http://paste.openstack.org/show/436516/
2015-09-01 16:36:45 Dolph Mathews keystone: importance Undecided High
2015-09-02 00:49:30 Liusheng summary Token Revocation Bypass PKI Token Revocation Bypass
2015-09-02 04:45:56 Adam Young keystone: assignee Adam Young (ayoung)
2015-09-02 06:21:42 Adam Young attachment added modify_token.py https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4455970/+files/modify_token.py
2015-09-02 06:22:29 Adam Young attachment added derdump of Token data in ASN1 format https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4455971/+files/tokendata
2015-09-02 13:54:27 Dolph Mathews attachment added bug-1490804-tests-master-v1.patch https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4456156/+files/bug-1490804-tests-master-v1.patch
2015-09-02 16:24:46 Morgan Fainberg bug task added keystonemiddleware
2015-09-02 16:24:58 Morgan Fainberg keystonemiddleware: status New Confirmed
2015-09-02 16:25:06 Morgan Fainberg keystonemiddleware: status Confirmed New
2015-09-02 16:25:09 Morgan Fainberg keystonemiddleware: importance Undecided Critical
2015-09-02 16:25:11 Morgan Fainberg keystonemiddleware: importance Critical High
2015-09-02 16:25:30 Morgan Fainberg keystonemiddleware: assignee Adam Young (ayoung)
2015-09-02 16:25:44 Morgan Fainberg keystone: status New Invalid
2015-09-02 16:25:50 Morgan Fainberg keystone: assignee Adam Young (ayoung)
2015-09-02 16:26:23 Morgan Fainberg keystone: status Invalid New
2015-09-02 16:26:39 Morgan Fainberg keystone: assignee Adam Young (ayoung)
2015-09-03 04:24:28 Adam Young attachment added 0001-Reject-modified-PKI-Tokens.patch https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4456676/+files/0001-Reject-modified-PKI-Tokens.patch
2015-09-03 06:23:36 Adam Young attachment added 0001-hash-the-data-in-the-token.patch https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4456711/+files/0001-hash-the-data-in-the-token.patch
2015-09-03 17:06:28 Adam Young bug added subscriber Nathan Kinder
2015-09-03 17:07:13 Adam Young bug task added python-keystoneclient
2015-09-03 17:07:32 Adam Young python-keystoneclient: assignee Adam Young (ayoung)
2015-09-03 17:10:08 Adam Young attachment added 0001-Use-the-Keystoneclient-code-to-hash-the-token.patch https://bugs.launchpad.net/python-keystoneclient/+bug/1490804/+attachment/4456923/+files/0001-Use-the-Keystoneclient-code-to-hash-the-token.patch
2015-09-03 18:03:57 Adam Young bug task added django-openstack-auth
2015-09-03 18:17:55 Adam Young bug added subscriber Christina Darretta
2015-09-04 14:30:48 Adam Young django-openstack-auth: assignee Adam Young (ayoung)
2015-09-10 14:17:00 Adam Young bug added subscriber OSSG CoreSec
2015-09-10 17:28:09 Morgan Fainberg django-openstack-auth: status New Invalid
2015-09-11 16:50:00 Adam Young keystone: status New Confirmed
2015-09-11 16:50:07 Adam Young keystone: status Confirmed Triaged
2015-09-11 16:50:14 Adam Young keystonemiddleware: status New Triaged
2015-09-11 16:50:17 Adam Young python-keystoneclient: status New Triaged
2015-09-21 02:32:24 Liusheng attachment added bug1490804-patch-test-traceback.txt https://bugs.launchpad.net/python-keystoneclient/+bug/1490804/+attachment/4469888/+files/bug1490804-patch-test-traceback.txt
2015-09-21 14:59:06 Tristan Cacqueray bug task added ossn
2015-10-29 08:39:37 Adam Young attachment added 0001-Disable-PKI-token-Provider.patch https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4508239/+files/0001-Disable-PKI-token-Provider.patch
2015-11-02 15:49:17 Tristan Cacqueray ossn: importance Undecided Critical
2015-11-12 17:02:20 Nathan Kinder ossn: assignee Nathan Kinder (nkinder)
2015-11-19 23:15:54 Adam Young keystone: status Triaged Won't Fix
2015-11-19 23:16:35 Adam Young keystonemiddleware: status Triaged Won't Fix
2015-11-19 23:16:51 Adam Young python-keystoneclient: status Triaged Won't Fix
2015-12-01 22:10:38 Brant Knudson attachment added 0001-Add-audit-IDs-to-revocation-events.patch https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4528257/+files/0001-Add-audit-IDs-to-revocation-events.patch
2015-12-01 22:11:22 Brant Knudson attachment added 0001-Verify-audit_id-when-available.patch https://bugs.launchpad.net/keystone/+bug/1490804/+attachment/4528258/+files/0001-Verify-audit_id-when-available.patch
2015-12-10 20:38:56 Tristan Cacqueray summary PKI Token Revocation Bypass PKI Token Revocation Bypass (CVE-2015-7546)
2015-12-10 20:39:01 Tristan Cacqueray cve linked 2015-7546
2015-12-15 15:05:54 Tristan Cacqueray information type Private Security Public Security
2015-12-15 15:09:42 Tristan Cacqueray description This issue is being treated as a potential security risk under embargo. Please do not make any public mention of embargoed (private) security vulnerabilities before their coordinated publication by the OpenStack Vulnerability Management Team in the form of an official OpenStack Security Advisory. This includes discussion of the bug or associated fixes in public forums such as mailing lists, code review systems and bug trackers. Please also avoid private disclosure to other individuals not already approved for access to this information, and provide this same reminder to those who are made aware of the issue prior to publication. All discussion should remain confined to this private bug report, and any proposed fixes should be added to the bug as attachments. A keystone token which has been revoked can still be used by manipulating particular byte fields within the token. When a Keystone token is revoked it is added to the revoked list which stores the exact token value. Any API will look at the token to see whether or not it should accept a token. By changing a single byte within the token, the revocation can be bypassed. see the testing script [1]. It is suggested that the revocation should be changed to only check the token's inner ID. [1] http://paste.openstack.org/show/436516/ A keystone token which has been revoked can still be used by manipulating particular byte fields within the token. When a Keystone token is revoked it is added to the revoked list which stores the exact token value. Any API will look at the token to see whether or not it should accept a token. By changing a single byte within the token, the revocation can be bypassed. see the testing script [1]. It is suggested that the revocation should be changed to only check the token's inner ID. [1] http://paste.openstack.org/show/436516/
2015-12-15 20:48:37 OpenStack Infra keystone: status Won't Fix In Progress
2015-12-15 20:48:37 OpenStack Infra keystone: assignee Adam Young (ayoung) Brant Knudson (blk-u)
2015-12-15 20:49:38 OpenStack Infra keystonemiddleware: status Won't Fix In Progress
2015-12-15 20:49:38 OpenStack Infra keystonemiddleware: assignee Adam Young (ayoung) Brant Knudson (blk-u)
2015-12-15 23:16:16 Steve Martinelli keystone: milestone mitaka-2
2015-12-16 02:01:47 Nathan Kinder ossn: status New Fix Released
2015-12-17 16:24:32 Brant Knudson tags kilo-backport-potential liberty-backport-potential
2016-01-05 19:58:00 Tristan Cacqueray ossa: status Incomplete Confirmed
2016-01-09 03:29:35 OpenStack Infra keystone: status In Progress Fix Released
2016-01-11 19:46:07 OpenStack Infra keystonemiddleware: status In Progress Fix Released
2016-01-14 02:22:46 OpenStack Infra tags kilo-backport-potential liberty-backport-potential in-stable-kilo kilo-backport-potential liberty-backport-potential
2016-01-14 12:56:48 OpenStack Infra tags in-stable-kilo kilo-backport-potential liberty-backport-potential in-stable-kilo in-stable-liberty kilo-backport-potential liberty-backport-potential
2016-01-21 20:25:15 Dave Walker nominated for series keystone/kilo
2016-01-21 20:25:15 Dave Walker bug task added keystone/kilo
2016-01-21 20:26:01 Dave Walker keystone/kilo: status New Fix Committed
2016-01-21 20:26:01 Dave Walker keystone/kilo: milestone 2015.1.3
2016-01-21 20:47:22 Tristan Cacqueray keystone/kilo: status Fix Committed In Progress
2016-01-25 09:42:28 OpenStack Infra keystone/kilo: status In Progress Fix Committed
2016-01-29 19:41:06 Tristan Cacqueray summary PKI Token Revocation Bypass (CVE-2015-7546) [OSSA 2015-006] PKI Token Revocation Bypass (CVE-2015-7546)
2016-01-29 19:46:40 Tristan Cacqueray summary [OSSA 2015-006] PKI Token Revocation Bypass (CVE-2015-7546) [OSSA 2015-005] PKI Token Revocation Bypass (CVE-2015-7546)
2016-01-29 19:46:43 Tristan Cacqueray ossa: status Confirmed Fix Released
2016-01-29 19:46:49 Tristan Cacqueray summary [OSSA 2015-005] PKI Token Revocation Bypass (CVE-2015-7546) [OSSA 2016-005] PKI Token Revocation Bypass (CVE-2015-7546)
2016-02-02 20:20:17 Morgan Fainberg keystone/kilo: importance Undecided High
2017-01-17 19:50:55 Morgan Fainberg keystone/kilo: status Fix Committed Fix Released