Comment 0 for bug 1526823

Revision history for this message
Adam Heczko (aheczko-mirantis) wrote :

Problem description:

A keystone token which has been revoked can still be used by manipulating particular byte fields within the token.
When a Keystone token is revoked it is added to the revoked list which stores the exact token value. Any API will look at the token to see whether or not it should accept a token. By changing a single byte within the token, the revocation can be bypassed. see the testing script [1].

It is suggested that the revocation should be changed to only check the token's inner ID.

[1] http://paste.openstack.org/show/436516/

Solution proposal:
Backport fix from the upstream.
Warn customers about issue and potential risks.