yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #85739
[Bug 1188189] Re: Some server-side 'SSL' communication fails to check certificates (use of HTTPSConnection)
** Changed in: cinder
Status: In Progress => Fix Committed
** Changed in: cinder
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1188189
Title:
Some server-side 'SSL' communication fails to check certificates (use
of HTTPSConnection)
Status in Cinder:
Fix Released
Status in OpenStack Identity (keystone):
Fix Released
Status in neutron:
Fix Released
Status in oslo.vmware:
Fix Released
Status in OpenStack Security Advisory:
Won't Fix
Status in OpenStack Security Notes:
Fix Released
Status in python-keystoneclient:
Fix Released
Status in OpenStack Object Storage (swift):
Invalid
Bug description:
Grant Murphy from Red Hat reported usage of httplib.HTTPSConnection
objects. In Python 2.x those do not perform CA checks so client
connections are vulnerable to MiM attacks.
"""
The following files use httplib.HTTPSConnection :
keystone/middleware/s3_token.py
keystone/middleware/ec2_token.py
keystone/common/bufferedhttp.py
vendor/python-keystoneclient-master/keystoneclient/middleware/auth_token.py
AFAICT HTTPSConnection does not validate server certificates and
should be avoided. This is fixed in Python 3, however in 2.X no
validation occurs. I suspect this is also applicable to most OpenStack
modules that make HTTPS client calls.
Similar problems were found in ovirt:
https://bugzilla.redhat.com/show_bug.cgi?id=851672 (CVE-2012-3533)
With solutions for ovirt:
http://gerrit.ovirt.org/#/c/7209/
http://gerrit.ovirt.org/#/c/7249/
"""
To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1188189/+subscriptions