15:05:22 #startmeeting keystone 15:05:22 Meeting started Wed Oct 16 15:05:22 2024 UTC and is due to finish in 60 minutes. The chair is d34dh0r53. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:05:22 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:05:22 The meeting name has been set to 'keystone' 15:05:52 Reminder: This meeting takes place under the OpenInfra Foundation Code of Conduct 15:05:58 #link https://openinfra.dev/legal/code-of-conduct 15:06:03 #topic roll call 15:06:11 admiyo, bbobrov, crisloma, d34dh0r53, dpar, dstanek, hrybacki, lbragstad, lwanderley, kmalloc, rodrigods, samueldmq, ruan_he, wxy, sonuk, vishakha, Ajay, rafaelwe, xek, gmann, zaitcev, reqa, dmendiza[m], dmendiza, mharley, jph, gtema, cardoe 15:06:13 o/ 15:07:25 o/ 15:08:22 #topic review past meeting work items 15:08:34 #link https://meetings.opendev.org/meetings/keystone/2024/keystone.2024-10-09-15.05.html 15:08:50 no action items from last week 15:08:51 #topic liaison updates 15:09:59 nothing from VMT or releases 15:10:41 \o 15:11:02 #topic specification OAuth 2.0 (hiromu) 15:11:06 #link https://review.opendev.org/q/topic:bp%252Foauth2-client-credentials-ext 15:11:15 #link https://review.opendev.org/q/topic:bp%252Fenhance-oauth2-interoperability 15:11:23 External OAuth 2.0 Specification 15:11:33 #link https://review.opendev.org/c/openstack/keystone-specs/+/861554 (merged) 15:11:37 OAuth 2.0 Implementation 15:11:40 #link https://review.opendev.org/q/topic:bp%252Fsupport-oauth2-mtls 15:11:44 OAuth 2.0 Documentation 15:11:50 #link https://review.opendev.org/c/openstack/keystone/+/838108 (merged) 15:11:55 #link https://review.opendev.org/c/openstack/keystoneauth/+/838104 (merged) 15:12:05 no updates from me on any of this 15:12:13 #topic specification Secure RBAC (dmendiza[m]) 15:12:16 #link https://governance.openstack.org/tc/goals/selected/consistent-and-secure-rbac.html#z-release-timeline_ 15:12:21 2024.1 Release Timeline 15:12:24 Update oslo.policy in keystone to enforce_new_defaults=True 15:12:27 Update oslo.policy in keystone to enforce_scope=True 15:12:50 not sure if dmendiza is around, he messaged me that he might be away-ish this morning 15:15:42 ok, moving on 15:15:48 #topic specification OpenAPI support (gtema) 15:15:53 #link https://review.opendev.org/q/topic:%22openapi%22+project:openstack/keystone 15:15:54 https://review.opendev.org/c/openstack/keystone/+/925020 could now also land to ease api-ref work 15:15:57 gtema: api-ref work started 15:16:11 I think I also saw that gtema (Artem Goncharov) is on PTO 15:17:38 looks like it, moving on 15:17:45 #topic specification domain manager (mhen) 15:17:48 #link https://review.opendev.org/q/topic:%22domain-manager%22 15:17:50 tempest core lib patch has been merged, only keystone-tempest-plugin left 15:17:54 created a patchset for documentation: https://review.opendev.org/c/openstack/keystone/+/928135 15:18:47 yes, only tempest plugin and documentation patchsets are left 15:19:24 got a lot of upvotes by now - is there anything missing still? 15:19:40 ok, I'll bug dmendiza and Grzegorz Grasza to push those through 15:19:46 nice, thanks 15:19:51 mhen: I think we're just waiting on final reviews 15:19:57 ack, YW 15:19:57 ok 15:20:15 next up 15:20:25 #topic specification Type annotations (stephenfin) 15:20:28 #link https://review.opendev.org/q/project:openstack/keystoneauth+topic:typing 15:20:31 This is just pending reviews now. I will push the remaining patches as soon as a sufficient quantity of the current ones land. 15:20:45 many reviews are owed 15:22:36 Sorry I missed the secure RBAC topic...I was distracted by discussing it over in #openstack-nova 15:23:17 ahh, no worries admiyo 15:23:42 So...while I am not 100% certain, I think the solution in place means we should close bug 96869 15:23:49 Dear community. 15:24:17 It is the longest open bug in the tracker, and it is addrtessed, I think, but the secure RBAC approach. I don't feel 100% certain there. 15:24:23 maybe like, 55% 15:24:54 nooooo that bug is legendary 15:25:05 I think that the solution is kinda wrong 15:25:39 and I am pretty sure that nova is self contradictory by ignoring the project Id for the operation, but requiring a project scoped token 15:25:59 #link https://bugs.launchpad.net/keystone/+bug/968696 15:25:59 and they are certainly wrong for marking it 'wishlist" and "won't fix" 15:26:04 BUT.... 15:26:07 that's the bug being referred to 15:26:14 Aye. sorry for missing the lin 15:26:16 k 15:27:19 I think that ...if and only iff ADMIN is reserved for operations that should never be allowed to be granted to managers of projects, then it is OK to say that they have addressed it 15:27:28 dmendiza: is really the one to talk to about this 15:28:07 as I recall, there were cases where reources got orphaned and you had to be aadmin to clean them up, which means that a project MANAGER would not have been able to clean up after a mistake, and thuse projects were not self maintaining 15:28:59 It is a PTL issue. It is an openstack wide issue, and it limits adoption. They are pushing the fix back on keystone. 15:29:44 And I don't know that Keystone alone can fix it, and I would argue that the fix is very fragile 15:29:46 So with Secure RBAC being a top level priority, I think this is something we can work to clean up. 15:30:13 Dmitriy Rabotyagov proposed openstack/keystone master: Re-initiate OSA rolling upgrade tests https://review.opendev.org/c/openstack/keystone/+/932512 15:30:19 I'd like to work with some folks on defining some more user personas which I think would be helpful. 15:30:42 So if ANY service in openstack requires ADMIN for any user-level operation, and they assign it, they have opened up a security hole in Nova 15:30:43 We don't have to craft roles for each one but we can say "this persona should not ever have admin role" or some such. 15:32:15 So, from a keystone perspective, we can be dilligent and avoid things like we used to do: 15:32:17 I think that might help downstream or operators by understanding those personas. Cause I feel like those leaks happen from downstream / operators trying to make something work how they think and then nova accepting a band aid. 15:32:24 you needed admin to add a user to a project 15:32:33 which means projects were not self managing 15:32:54 but that has to be true of every service in the catalog 15:33:12 and, yeah, just default policy. People can always break things via custom policy 15:33:36 Are nested projects still a thing? 15:34:18 That actually helped with a lot of the operators concerns 15:36:06 They are documented and the Red Hat docs talk about them. 15:36:14 Anyway,I had a long write up of this from when I was assigned the bug: https://adam.younglogic.com/2017/05/fixing-bug-96869/ 15:37:19 The issue was that operators wanted to be able to use a single, project scoped token to do operations across the whole tree. It was, and is, a mess 15:37:54 Let me talk with dmendiza about this, there may be a case for finally closing that bug with the domain manager role 15:37:55 Because they don't want to have to authenticate to each project 15:38:26 No...it still does'nt handle it. Apologies, pulling stuff from long term memory.... 15:39:17 What is lacking in that role? 15:39:20 the token is scoped to a project but they want to do a global operation, and there is no way for Nova to know that a given project is nested under another project 15:39:30 it is fine for Keystone, not for the other services 15:39:57 I guess the problem is that domain-ownership awareness is not really there in other services for their resources 15:40:02 I think the "is admin project" hack is still needed. 15:40:13 mhen, yes 15:40:40 it would require a lot more work for some services to properly adapt the domain manager persona then 15:40:50 so...IF we create a majik ADMIN project, and if we add a flag to the token saying "this is an admin project" and if Nova checks for that as well as ADMIN then things would work 15:41:10 domain tokens never go to other services 15:41:15 domain were a mistake. 15:41:25 as was calling things projects instead of tennants 15:41:38 sins of the past that will be visted on our descendants.... 15:41:40 but anyway 15:42:23 if a token is sent to nova with "is_admin_project=yes" and they chose to ignore it, that is on them 15:43:01 Its not a hard check to implement, and it can be done in keystone middleware if we really want, but that is a whole nother approach that I abandoned 15:44:48 That way, if, say HEAT requires Admin for something, and that slips through, Nova could protect itself by also required is_admin_project 15:45:19 anyway, I have said my piece, and will stop beat d34dh0r53 15:45:37 lol 15:46:31 thanks for bringing it up, I mistakenly thought the domain manager work helped to fix this but I think there is still work to do 15:46:36 also...we never addressed how to limit things that required acccess to two proejcts 15:47:02 I think there was an issue where deleting a project in keystone orphaned all the resources everywhere. 15:47:08 And...I think I had a fix for that 15:47:22 but I don';t thik that was RBAC 15:47:48 https://docs.openstack.org/python-openstackclient/latest/cli/command-objects/project-cleanup.html 15:47:49 :) 15:47:49 AH yes 15:47:52 https://review.opendev.org/c/openstack/keystone/+/664746 15:48:30 It was KINDA an RBAC issue in that you needed to get a system admin to do all your clean up. This avoids that case. 15:49:09 * admiyo really done now 15:52:00 meeting over? 15:52:03 Thanks admiyo 15:52:37 #topic specification Include bad password details in audit messages (stanislav-z) 15:52:40 # link https://review.opendev.org/c/openstack/keystone-specs/+/915482 15:52:46 # link https://review.opendev.org/c/openstack/keystone/+/932423 15:52:59 s/// 15:53:19 s/// 15:53:56 Hello! I'm looking for any feedback on both. And in the meantime was going to work on adding tests for the implementation 15:54:46 @stanislav-z, is the idea that an admin can compare the hash to the hash in the database and say "yep they don't match?" 15:57:01 there is no relation to the database hash. the idea is that when there is a bruteforce attack the hash will be changing frequently. while if e.g. some end-user automation got stuck with the old password the hash won't be changing. so by checking the hash, it may be possible to perform a more educated guess if user is experiencing an attack or just has some broken automation 15:57:34 by checking how hash is changing* 15:57:44 Ah. THat makes more sense. But any change in the users passwords attempt end up as differnt hashes, and look like an attack? 15:58:14 password pa$$word p@$$word p@$$w0rd 15:58:50 only if something/someone would be continuing to submit the old (wrong) password. no hashes will be showing up for successful authentication events 15:59:32 but is a user submits password pa$$word p@$$word p@$$w0rd and they all get hashed, it is safe to put the first 5 chars of the hash in the log? 16:00:42 According to the spec the N characters isn't logged, it's sent in a message, is that correct? 16:01:21 with the default hashing function from possible WIP the hash size would be 88 characters. providing just 5 (default; configurable) should be safe - and it will only appear in event notifications 16:02:21 that's correct. but N - is the number of character that would passed to the event (not how much would be truncated from the hash) 16:02:37 same thing, though. Written down somewhere not in ephemeral memory and the database. Thus widening exposure to the hash. If a user types the same thing 3 times, the partial hash will show up. The the person notified will have access to that partial hash. Which could itslef be used in a brute force attack on the password. 16:03:09 "If the feature is enabled, it will expose N (N=5 by default) characters of hash 16:03:09 91 16:03:09 of bad password. These symbols will not be communicated with the response, but 16:03:09 92 16:03:09 will be sent via messages." 16:03:15 I think that this is OK 16:03:35 if you have access to event notification, you have access to the user database and the main password hash. 16:03:40 I mean, likely. 16:03:53 yeah, likely 16:04:26 if someone only had access to the event notification, it WOULD expand the attack window, but that has to be configured by Keystone admin, and so the end effect is the same 16:04:29 That's my concern is that a potentially good password hash will be written somewhere 16:04:45 I think it is a valid concern 16:05:32 If you know that sha1 is used, and you brute force, you will end up with a few false positives, but it would still be enough info for you to crack simple passwords 16:06:15 I wonder if a better approach would be to keep this information internal. 16:06:29 it also offers to provide a "personalization salt" in config - e.g. if event consumer doesn't have access to that config entry, it would be much more difficult to recover the password from partial hash 16:07:02 (without knowing that salt) 16:07:13 But the only thing they are then finding out is "it is the same as previous" or different. COuldn't keystone keep track of that? 16:07:52 Internally we could keep a counter of identical hash attempts and alert based on a threshold 16:08:36 So, I would not kill this effort outright, but I would suggest that the spec include a larger discussion about how this would be used, the security needed to protect it, and alternatives and modifications to the approach? 16:08:51 indeed 16:09:06 sound good, thanks 16:09:17 Thank you Stanislav Zaprudskiy ! 16:09:42 #topic open discussion 16:09:55 nothing on the agenda, does anyone have anything? 16:11:07 we're over time, and I don't see any new bugs so I'll end it here 16:11:16 #endmeeting