Hello Barbican folks,
Recently I was experimenting with the KMIPSecretStore and observed the 
following behaviour. Issuing the API call:

"curl -X POST -H 'content-type:application/json' -H 'X-Project-Id:12345' -d 
'{"payload": "my-secret-here", "payload_content_type": "text/plain", 
"algorithm": "aes", "bit_length":256}' 
http://localhost:9311/v1/secrets”<http://localhost:9311/v1/secrets%22>

worked to store a secret in the backend HSM, but upon retrieving the secret I 
was presented with “mysecrethere”, instead of the expected value 
“my-secret-here”. This corruption of the secret occurs because internally it is 
assumed to be encoded as base64 and the base64 decoder drops invalid bytes, in 
this case the “-“ characters. For more discussion please see the comments on 
this review: https://review.openstack.org/#/c/133725/

It seems we need to add some validation to the process so I would like to get a 
discussion going on what we should be validating and where in the pipeline it 
might fit best. Im happy to code up a patch to make this happen but want to get 
some input and a consensus on things first.

--
Tim Kelsey
Cloud Security Engineer
HP Helion

_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to