+1 (binding)

* Executed the validation script:
  - Source code compiles and passes all tests
  - There are no RAT violations
  - Checksums match
  - Signatures match
* All LICENSE and NOTICE files are correct

* I ran also LiveTests for Docker and SoftLayer:
  - SoftLayer:
      Tests run: 154, Failures: 15, Errors: 0, Skipped: 10
  - Docker (still on 1.0 version):
      Tests run: 38, Failures: 2, Errors: 0, Skipped: 26

For Docker *LiveTests: the provider needs a version bump, Docker
continues to push new version out continuously, so the next release
will have a best LiveTest coverage and will support latest Docker
Engine.

Cheers,
Andrea

On Fri, Oct 17, 2014 at 7:15 AM, Niraj Tolia <nto...@maginatics.com> wrote:
> On Thu, Oct 16, 2014 at 10:04 PM, Chris Custine <chris.cust...@gmail.com> 
> wrote:
>>
>> On October 16, 2014 at 10:49:33 PM, Niraj Tolia 
>> (nto...@maginatics.com(mailto:nto...@maginatics.com)) wrote:
>>> On Thu, Oct 16, 2014 at 9:43 PM, Chris Custine wrote:
>>> >
>>> > I am hoping others can confirm this, but after reading the advisory and 
>>> > several commentaries on it, I can’t think of any way that this exploit 
>>> > can affect a jclouds client. My interpretation is that in addition to the 
>>> > man in the middle requirement to force the protocol downgrade to SSL3 and 
>>> > subsequent packet modification, the exploit also requires some injection 
>>> > of code onto the client that will cause the client to execute repeated 
>>> > requests to an endpoint with an incrementing http path length and 
>>> > decrementing body length.
>>> >
>>>
>>> No, anyone on the network path in between the client and server can
>>> initiate this attack. https://www.openssl.org/~bodo/ssl-poodle.pdf and
>>> https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html has a
>>> lot more context on this but the interesting quote is:
>>
>> This is the part that enables the exploit of SSL3, but this is not the 
>> actual exploit.
>>
>>>
>>> So if an attacker that controls the network between the client and the
>>> server interferes with any attempted handshake offering TLS 1.0 or
>>> later, such clients will readily confine themselves to SSL 3.0.
>>
>> I understand that part, but this is just initiating the protocol downgrade.  
>> Downgrading to SSL3 isn’t really the issue, the issue is what is done to 
>> exploit that.  They would still need to initiate many specifically formatted 
>> requests with varying path and body lengths from the *real* client to 
>> eventually resolve the encrypted attributes (from a jclouds standpoint this 
>> would probably be auth headers).  This means that some part of the response 
>> from the actual endpoint would have to have some content that causes jclouds 
>> itself to go rogue and start making these orchestrated requests to nonsense 
>> urls, and with body content that is decremented to match the incrementing 
>> path, and do this many times (up to 256 times for each byte) until the 
>> server does not reject the SSL.  If we have an flaw that allows execution of 
>> arbitrary script code of some variety in jclouds, then I am suddenly worried 
>> about a lot more than this exploit. :-)
>>
>
>
> Ah, I see better what you mean. Yes, from my understanding of POODLE,
> there has to be some way for the attacker to be able to get jclouds to
> generate URLs in the above scenario. We do not know all the ways in
> which jclouds users use the library and if users can control the URLs
> (say, for example, using a filename for upload that gets directly
> encoded into the filename), I wonder if that is sufficient to launch
> the attack.
>
> Cheers,
> Niraj
>
>
>> My 2 cents.
>>
>> Chris
>>
>>
>>>
>>> Cheers,
>>> Niraj
>>>
>>>
>>> >
>>> > I don’t see any opportunities to inject random script code into a jclouds 
>>> > client and have it execute in a way similar to javascript in a browser, 
>>> > and from what I have read, that is what it would take to make use of this 
>>> > exploit.
>>> >
>>> > Hopefully other will have the opportunity to interpret this and weigh in 
>>> > with their insight as well.
>>> >
>>> > Thanks,
>>> > Chris
>>> >
>>> >
>>> > --
>>> > Chris Custine
>>> >
>>> >
>>> >
>>> > On October 16, 2014 at 6:20:23 PM, Andrew Phillips 
>>> > (aphill...@qrmedia.com(mailto:aphill...@qrmedia.com)) wrote:
>>> >
>>> > > > I prefer to exercise an abundance of caution and extend the vote until
>>> > > > we understand the issue.
>>> > >
>>> > > I wasn't planning to close the vote until we have more details on
>>> > > this, indeed. Obviously, the more people can help have a look at this,
>>> > > the better ;-)
>>> > >
>>> > > PR at https://github.com/jclouds/jclouds/pull/575
>>> > >
>>> > > Thanks!
>>> > >
>>> > > ap
>>> >
>>

Reply via email to