On Sep 20, 2015, at 20:46, Shinobu Kinjo <ski...@redhat.com> wrote:

>> No system but keystone needs access to these keys.
> 
> Yeah, this triggers my concerns since keystone would have huge responsibility 
> about security for the stack.
> 
> Keystone have r/w permission to key files, and encrypt/decrypt 
> 

Keystone already has a massive level of responsibility with regards to security 
in openstack. 


> 119         with open(key_file, 'w') as f:
> 120             f.write(key)
> ...

This is only required if you use the keystone-manage rotate keys. You can 
deploy keys via a CMS or otherwise. 

> 227 def load_keys():
> 228     """Load keys from disk into a list.
> 
> And it can control keys.
> 
> 199     key_files[new_primary_key] = os.path.join(
> 200         CONF.fernet_tokens.key_repository,
> 201         str(new_primary_key))
> ...
> 220     while len(keys) > (max_active_keys - 1):
> 221         index_to_purge = keys.pop()
> 222         key_to_purge = key_files[index_to_purge]
> 

This is no different than keystone being able to issue UUID tokens (if keystone 
is compromised the db connection can be compromised, this means the compromiser 
can inject a row into the db via direct sql manipulation, granting tokens. 

Likewise, you need to secure the private key in the case if PKI tokens. If the 
private key is compromised, you also have similar issues. 

> Ref:
> https://cryptography.io/en/latest/fernet/
> 
> Shinobu
> 
> ----- Original Message -----
> From: "Morgan Fainberg" <morgan.fainb...@gmail.com>
> To: "Shinobu Kinjo" <ski...@redhat.com>
> Cc: "Adam Young" <ayo...@redhat.com>, openstack@lists.openstack.org
> Sent: Monday, September 21, 2015 12:00:08 PM
> Subject: Re: [Openstack] PKI Issue vs UUID
> 
> 
> 
>> On Sep 20, 2015, at 19:17, Shinobu Kinjo <ski...@redhat.com> wrote:
>> 
>> Fernet token sounds like not being persistent, and not having too much 
>> information.
>> Meaning that it sounds like more secure than UUID and PKI.
>> 
>> And performance wise, it also going to be more reasonable than them.
>> It's because of less processes for users validation. And that deployment 
>> doesn't look like difficult.
>> 
>> Everything sounds pretty good.
>> 
>> But there would be problematic activity, key rotation.
>> And keystone itself still have token file[s], /etc/keystone/fernet-keys/.
>> It potentially causes huge security issue.
>> 
>> "./doc/source/configuration.rst" implies this.
> 
> Fernet keys are only ever utilized on the keystone systems. You will need to 
> secure these keys, but it really is not significantly different than securing 
> the private key utilized to sign the PKI tokens. No system but keystone needs 
> access to these keys. 
> 
> 
>> Is or would there be further workaround of that tokens to deal with any 
>> users information securely and safely.
>> 
>> Shinobu
>> 
>> ----- Original Message -----
>> From: "Adam Young" <ayo...@redhat.com>
>> To: openstack@lists.openstack.org
>> Sent: Monday, September 21, 2015 12:02:30 AM
>> Subject: Re: [Openstack] PKI Issue vs UUID
>> 
>>> On 09/19/2015 03:52 PM, Remo Mattei wrote:
>>> Hello all,
>>> 
>>> I have notice that when I do the RDO installation of Kilo with the UUID and 
>>> login with the admin account, I can select which project to spin up new 
>>> instances and also which project to select from the pull down menu. If I do 
>>> the same installation using packstack and change the keystone from UUID to 
>>> PKI, I cannot select any of those options.
>> 
>> Stick with UUID.  THere are enough issues with PKI that you should not 
>> use them.
>> 
>> Fernet tokens are coming, and will help with horizontal scalability.
>> 
>>> 
>>> Has anyone seen this issue? I notice that there was a bug going on while 
>>> back but I thought that would have been fixed by now.
>>> 
>>> Thanks for any tips on how to go by this.
>>> 
>>> Remo
>>> _______________________________________________
>>> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>>> Post to     : openstack@lists.openstack.org
>>> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> 
>> 
>> _______________________________________________
>> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> Post to     : openstack@lists.openstack.org
>> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> 
>> _______________________________________________
>> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
>> Post to     : openstack@lists.openstack.org
>> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to