Hi Adam,

I apologize if I came across as disrespectful.  I was becoming frustrated that 
what I perceived as a valid concern was seemingly being ignored, but I 
recognize that there is no excuse for addressing you in a manner that I would 
not myself wish to be treated.  I will do better going forward.

Thanks,


Maru

ps: Thank you for the reminder, Joe!

On 2012-08-02, at 1:56 AM, Joseph Heck wrote:

> Hey Maru,
> 
> I think you're putting too many words in Adam's mouth here. First, Adam didnt 
> assert is wasnt valuable, useful, or nessecary - simply that it wasnt in the 
> first cut and not in the list that we agreed was critically essential to an 
> initial implementation. As you noted, its a complex and somewhat tricky issue 
> to get right.
> 
> There's always room for more participation to correct the flaws you see in 
> the existing system - the beauty of open source. I would love to see 
> continued work on the signing and revocation work to drive in these features 
> that mean so much to you.  I'd be happy to open a blueprint if you can stand 
> behind it, define what you think it required, and commit to the work to 
> implement that revocation mechanism.
> 
> Implying negative emotions on Adam's part when he's been one driving the 
> implementation and doing the work is simply inappropriate. Please consider 
> the blueprint route, definition of a viable solution, and work to make it 
> happen instead of name calling and asserting how the developers doing the 
> work are screwing up.
> 
> - joe
> 
> On Aug 1, 2012, at 8:05 PM, Maru Newby <mne...@internap.com> wrote:
>> Hi Adam,
>> 
>> I apologize if my questions were answered before.  I wasn't aware that what 
>> I perceive as a very serious security concern was openly discussed.  The 
>> arguments against revocation support, as you've described them, seem to be:
>> 
>>  - it's complicated/messy/expensive to implement and/or execute
>>  - Kerberos doesn't need it, so why would we?
>> 
>> I'm not sure why either of these arguments would justify the potential 
>> security hole that a lack of revocation represents, but I suppose a 'short 
>> enough' token lifespan could minimize that hole.  But how short a span are 
>> you suggesting as being acceptable?
>> 
>> The delay between when a user's access permissions change (whether roles, 
>> password or even account deactivation) and when the ticket reflects that 
>> change is my concern.  The default in Keystone has been 24h, which is 
>> clearly too long.  Something on the order of 5 minutes would be ideal, but 
>> then ticket issuance could become the bottleneck.  Validity that's much 
>> longer could be a real problem, though.  Maybe not at the cloud 
>> administration level, but for a given project I can imagine someone being 
>> fired and their access being revoked.  How long is an acceptable period for 
>> that ticket to still be valid?  How much damage could be done by someone who 
>> should no longer have access to an account if their access cannot be 
>> revoked, by anyone, at all?
>> 
>> I'm hearing that you, as the implementer of this feature, don't consider the 
>> lack of revocation to be an issue.  What am I missing?  Is support for 
>> revocation so repugnant that the potential security hole is preferable?  I 
>> can see that from a developer's perspective, but I don't understand why 
>> someone deploying Keystone wouldn't avoid PKI tokens until revocation 
>> support became available.
>> 
>> Thanks,
>> 
>> 
>> Maru 
>>  
>> 
>> 
>> On 2012-08-01, at 9:47 PM, Adam Young wrote:
>> 
>>> On 08/01/2012 09:19 PM, Maru Newby wrote:
>>>> 
>>>> I see that support for PKI Signed Tokens has been added to Keystone 
>>>> without support for token revocation.  I tried to raise this issue on the 
>>>> bug report:
>>>> 
>>>> https://bugs.launchpad.net/keystone/+bug/1003962/comments/4
>>>> 
>>>> And the review:
>>>> 
>>>> https://review.openstack.org/#/c/7754/
>>>> 
>>>> I'm curious as to whether anybody shares my concern and if there is a 
>>>> specific reason why nobody responded to my question as to why revocation 
>>>> is not required for this new token scheme.   Anybody?
>>> 
>>> It was discussed back when I wrote the Blueprint.  While it is possible to 
>>> do revocations with PKI,  it is expensive and requires a lot of extra 
>>> checking.  Revocation is a policy decision, and the assumption is that 
>>> people that are going to use PKI tokens are comfortable with out 
>>> revocation.  Kerberos service tickets have the same limitation, and 
>>> Kerberos has been in deployment that way for close to 25 years.
>>> 
>>> Assuming that PKI ticket lifespan is short enough,  revocation should not 
>>> be required.  What will be tricky is to balance the needs of long lived 
>>> tokens (delayed operations, long running operations) against the needs for 
>>> reasonable token timeout.
>>> 
>>> PKI Token revocation would look like CRLs in the Certificate world.  While 
>>> they are used, they are clunky.  Each time a token gets revoked, a blast 
>>> message would have to go out to all registered parties informing them of 
>>> the revocation.  Keystone does not yet have a message queue interface, so 
>>> doing that is prohibitive in the first implementation.
>>> 
>>> Note that users can get disabled, and token chaining will no longer work:  
>>> you won't be able to use a token to get a new token from Keystone.
>>> 
>>> 
>>>> 
>>>> Thanks,
>>>> 
>>>> 
>>>> Maru
>>>> 
>>>> 
>>>> 
>>>> 
>>>> _______________________________________________
>>>> Mailing list: https://launchpad.net/~openstack
>>>> Post to     : openstack@lists.launchpad.net
>>>> Unsubscribe : https://launchpad.net/~openstack
>>>> More help   : https://help.launchpad.net/ListHelp
>>> 
>>> _______________________________________________
>>> Mailing list: https://launchpad.net/~openstack
>>> Post to     : openstack@lists.launchpad.net
>>> Unsubscribe : https://launchpad.net/~openstack
>>> More help   : https://help.launchpad.net/ListHelp
>> 
>> _______________________________________________
>> Mailing list: https://launchpad.net/~openstack
>> Post to     : openstack@lists.launchpad.net
>> Unsubscribe : https://launchpad.net/~openstack
>> More help   : https://help.launchpad.net/ListHelp

_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to