Fwd: rgw keystone revocation thread

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Pavan,

Your email sparked some backchannel discussion.

I -think- Marcus and Radoslaw would agree that running a revocation thread should be configurable.  The ability to properly detect revoked Fernet tokens (OS-REVOKE, below) will be implemented upstream.

Regards,

Matt

----- Forwarded Message -----
From: "Radoslaw Zarzynski" <rzarzynski@xxxxxxxxxxxx>
To: "Marcus Watts" <mwatts@xxxxxxxxxx>
Cc: "Matt Benjamin" <mbenjamin@xxxxxxxxxx>, "Yehuda Sadeh-Weinraub" <ysadehwe@xxxxxxxxxx>
Sent: Wednesday, April 5, 2017 7:01:15 AM
Subject: Re: rgw keystone revocation thread

Hi Marcus,

Thanks a lot for the these points!

> 3. It's possible to revoke fernet tokens.  Revoked fernet tokens
> can no longer be validated.  Clearly internally they get marked
> as revoked.  *However, they don't appear in the output from
> OS-PKI/revoked.*

Especially this one is the game-changer. The same might apply
to the "tokens/revoked" of Keystone API v2. In the end of 2016
it has been documented [1] (together with OS-PKI/revoked) in
a way suggesting [2] it works only with PKI tokens. It's possible
that PKIZ are also covered but I'm not sure about Fernet/UUID.

> 4. The replacement api is /v3/OS-REVOKE/events
> This appears to be 2 generations ahead of OS-PKI/revoked;
> there was something inbetween that apparently had an
> inconvenient dependency on "expires_at".  It does not
> use a signing key.  In order to use it, it's necesary
> to track things by "audit_id".  This comes back with the
> token validate call.

I just created a ticket for OS-REVOKE:
  * http://tracker.ceph.com/issues/19499

Regards,
Radek

[1] https://bugs.launchpad.net/keystone/+bug/1626778
[2] description of the "signed" parameter,
     https://git.openstack.org/cgit/openstack/keystone/commit/?id=c70baa0a7a1f16d1e3cb36abc8666626633133db

On Wed, Apr 5, 2017 at 10:53 AM, Marcus Watts <mwatts@xxxxxxxxxx> wrote:
> I did some experiments with fernet tokens, revocation, and ceph.
>
> ceph: recent master branch.  keystone: liberty.
>
> summary.  doesn't work.  really doesn't work out of the box.
>
> Couple of comments and observations.
>
> 1. the upstream documentation for keystone mitaka+ "manual install"
> does not describe how to create a signing_key or indicate
> that it's necessary.  So far, in my keystone experiments,
> I haven't found any intrinsic reason why it's useful.
> Note that otaca doesn't even include pki/pkiz tokens.
>         [ ... and the upstream documentation for doing a
>         "manual install" of liberty appears to have vanished. ]
>
> 2. /v3/auth/tokens/OS-PKI/revoked
> is apparently deprecated.  In order to use it, it *is*
> necessary to create a signing key.
>
> 3. It's possible to revoke fernet tokens.  Revoked fernet tokens
> can no longer be validated.  Clearly internally they get marked
> as revoked.  However, they don't appear in the output from
> OS-PKI/revoked.
>
> 4. The replacement api is /v3/OS-REVOKE/events
> This appears to be 2 generations ahead of OS-PKI/revoked;
> there was something inbetween that apparently had an
> inconvenient dependency on "expires_at".  It does not
> use a signing key.  In order to use it, it's necesary
> to track things by "audit_id".  This comes back with the
> token validate call.
>
> 5. The ceph radosgw thread that calls OS-PKI/revoked doesn't
> do anything else but process the output of that.  If it succeeds,
> it can eventually invalidate tokens (by id, not by audit-id).
> I don't believe it does any other cache maintenance - so in my
> setup where it never sees fernet revocations I believe it's
> doing nothing useful.  (And the revoked token that I can't validate
> still works with ceph.)
>
> 6. The ceph radosgw keystone documentation documents adding the private key
> for both the CA and the signing cert.  I can't think of any reason
> why that's useful, necessary, or desirable.  It *is* necessary
> to have the signing *certificate* - the cms message from OS-PKI/revoked
> doesn't have a certificate.  (And the CA cert is probably also useful
> esp. if using https w/ keystone...)
>
> 7. There's not much point in repeatedly polling for revoked tokens
> if the token cache is empty.  ( but not bad to check once
> at startup just to validate the configuration. )
>
> 8. refs.
> https://docs.openstack.org/mitaka/install-guide-rdo/keystone.html
>         mitaka keystone manual install
> https://docs.openstack.org/developer/keystone/configuration.html
>         contains information on revocation events
> https://developer.openstack.org/api-ref/identity/v3-ext/?expanded=list-revocation-events-detail
>         api doc
> https://bugs.launchpad.net/keystone/+bug/1242620
>         history
> https://bugs.launchpad.net/openstack-api-site/+bug/1304606
>         history
> https://blueprints.launchpad.net/keystone/+spec/revocation-events
>         history
>
>                                                 -Marcus Watts

-- 
Matt Benjamin
Red Hat, Inc.
315 West Huron Street, Suite 140A
Ann Arbor, Michigan 48103

http://www.redhat.com/en/technologies/storage

tel.  734-821-5101
fax.  734-769-8938
cel.  734-216-5309
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux