Activity log for bug #1380669

Date Who What changed Old value New value Message
2014-10-13 15:12:21 Mark McClain bug added bug
2014-10-13 15:32:00 Mark McClain description R Previously we addressed the case where a tenant could attached a port to another tenant's router by knowing (or guessing) an existing router UUID [1]. The fix only prevents a tenant from attaching to existing routers, but does not defend against speculative router port creation. In systems where randomness is low, speculation of the result of uuid4() can allow a tenant to predict the ids of future routers enabling cross-tenant plugging since device_id is assumed to be trusted and queries are not scoped by tenant. The vulnerability was closed in Juno by the work to prevent orphaned ports [2]. That fix for Icehouse cannot be back ported since it adds new models and requires a database migration. A separate fix will be proposed for Icehouse and regression tests will be proposed for Juno.
2014-10-13 15:34:03 Mark McClain description Previously we addressed the case where a tenant could attached a port to another tenant's router by knowing (or guessing) an existing router UUID [1]. The fix only prevents a tenant from attaching to existing routers, but does not defend against speculative router port creation. In systems where randomness is low, speculation of the result of uuid4() can allow a tenant to predict the ids of future routers enabling cross-tenant plugging since device_id is assumed to be trusted and queries are not scoped by tenant. The vulnerability was closed in Juno by the work to prevent orphaned ports [2]. That fix for Icehouse cannot be back ported since it adds new models and requires a database migration. A separate fix will be proposed for Icehouse and regression tests will be proposed for Juno. Previously we addressed the case where a tenant could attached a port to another tenant's router by knowing (or guessing) an existing router UUID [1]. The fix only prevents a tenant from attaching to existing routers, but does not defend against speculative router port creation. In systems where randomness is low, speculation of the result of uuid4() can allow a tenant to predict the ids of future routers enabling cross-tenant plugging since device_id is assumed to be trusted and queries are not scoped by tenant. The vulnerability was closed in Juno by the work to prevent orphaned ports [2]. That fix for Icehouse cannot be back ported since it adds new models and requires a database migration. A separate fix will be proposed for Icehouse and regression tests will be proposed for Juno. [1] https://bugs.launchpad.net/neutron/+bug/1243327 [2] https://bugs.launchpad.net/neutron/+bug/1378866
2014-10-13 15:37:50 Thierry Carrez bug task added ossa
2014-10-16 09:37:09 Thierry Carrez nominated for series neutron/icehouse
2014-10-16 09:37:09 Thierry Carrez bug task added neutron/icehouse
2014-10-16 09:37:18 Thierry Carrez neutron: milestone 2014.2
2014-10-16 09:37:23 Thierry Carrez neutron: status In Progress Fix Released
2014-10-16 09:37:28 Thierry Carrez neutron/icehouse: importance Undecided Critical
2014-10-16 09:37:33 Thierry Carrez ossa: status New Confirmed
2014-10-16 09:37:37 Thierry Carrez ossa: importance Undecided High
2014-11-24 15:26:46 Thierry Carrez ossa: status Confirmed Incomplete
2014-11-24 15:27:09 Thierry Carrez ossa: importance High Undecided
2015-02-06 00:22:00 Jeremy Stanley information type Private Security Public
2015-02-06 00:22:07 Jeremy Stanley ossa: status Incomplete Won't Fix