Hi Andrea, Would you be willing to add yourself as the steward for Softlayer and Docker on our Stewards [1] page?
I don’t mean to put you on the spot but I wanted to throw it out there. Regards, Everett [1] https://wiki.apache.org/jclouds/Stewards On Oct 17, 2014, at 5:19 AM, Andrea Turli <andrea.tu...@gmail.com> wrote: > +1 (binding) > > * Executed the validation script: > - Source code compiles and passes all tests > - There are no RAT violations > - Checksums match > - Signatures match > * All LICENSE and NOTICE files are correct > > * I ran also LiveTests for Docker and SoftLayer: > - SoftLayer: > Tests run: 154, Failures: 15, Errors: 0, Skipped: 10 > - Docker (still on 1.0 version): > Tests run: 38, Failures: 2, Errors: 0, Skipped: 26 > > For Docker *LiveTests: the provider needs a version bump, Docker > continues to push new version out continuously, so the next release > will have a best LiveTest coverage and will support latest Docker > Engine. > > Cheers, > Andrea > > On Fri, Oct 17, 2014 at 7:15 AM, Niraj Tolia <nto...@maginatics.com> wrote: >> On Thu, Oct 16, 2014 at 10:04 PM, Chris Custine <chris.cust...@gmail.com> >> wrote: >>> >>> On October 16, 2014 at 10:49:33 PM, Niraj Tolia >>> (nto...@maginatics.com(mailto:nto...@maginatics.com)) wrote: >>>> On Thu, Oct 16, 2014 at 9:43 PM, Chris Custine wrote: >>>>> >>>>> I am hoping others can confirm this, but after reading the advisory and >>>>> several commentaries on it, I can’t think of any way that this exploit >>>>> can affect a jclouds client. My interpretation is that in addition to the >>>>> man in the middle requirement to force the protocol downgrade to SSL3 and >>>>> subsequent packet modification, the exploit also requires some injection >>>>> of code onto the client that will cause the client to execute repeated >>>>> requests to an endpoint with an incrementing http path length and >>>>> decrementing body length. >>>>> >>>> >>>> No, anyone on the network path in between the client and server can >>>> initiate this attack. https://www.openssl.org/~bodo/ssl-poodle.pdf and >>>> https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html has a >>>> lot more context on this but the interesting quote is: >>> >>> This is the part that enables the exploit of SSL3, but this is not the >>> actual exploit. >>> >>>> >>>> So if an attacker that controls the network between the client and the >>>> server interferes with any attempted handshake offering TLS 1.0 or >>>> later, such clients will readily confine themselves to SSL 3.0. >>> >>> I understand that part, but this is just initiating the protocol downgrade. >>> Downgrading to SSL3 isn’t really the issue, the issue is what is done to >>> exploit that. They would still need to initiate many specifically >>> formatted requests with varying path and body lengths from the *real* >>> client to eventually resolve the encrypted attributes (from a jclouds >>> standpoint this would probably be auth headers). This means that some part >>> of the response from the actual endpoint would have to have some content >>> that causes jclouds itself to go rogue and start making these orchestrated >>> requests to nonsense urls, and with body content that is decremented to >>> match the incrementing path, and do this many times (up to 256 times for >>> each byte) until the server does not reject the SSL. If we have an flaw >>> that allows execution of arbitrary script code of some variety in jclouds, >>> then I am suddenly worried about a lot more than this exploit. :-) >>> >> >> >> Ah, I see better what you mean. Yes, from my understanding of POODLE, >> there has to be some way for the attacker to be able to get jclouds to >> generate URLs in the above scenario. We do not know all the ways in >> which jclouds users use the library and if users can control the URLs >> (say, for example, using a filename for upload that gets directly >> encoded into the filename), I wonder if that is sufficient to launch >> the attack. >> >> Cheers, >> Niraj >> >> >>> My 2 cents. >>> >>> Chris >>> >>> >>>> >>>> Cheers, >>>> Niraj >>>> >>>> >>>>> >>>>> I don’t see any opportunities to inject random script code into a jclouds >>>>> client and have it execute in a way similar to javascript in a browser, >>>>> and from what I have read, that is what it would take to make use of this >>>>> exploit. >>>>> >>>>> Hopefully other will have the opportunity to interpret this and weigh in >>>>> with their insight as well. >>>>> >>>>> Thanks, >>>>> Chris >>>>> >>>>> >>>>> -- >>>>> Chris Custine >>>>> >>>>> >>>>> >>>>> On October 16, 2014 at 6:20:23 PM, Andrew Phillips >>>>> (aphill...@qrmedia.com(mailto:aphill...@qrmedia.com)) wrote: >>>>> >>>>>>> I prefer to exercise an abundance of caution and extend the vote until >>>>>>> we understand the issue. >>>>>> >>>>>> I wasn't planning to close the vote until we have more details on >>>>>> this, indeed. Obviously, the more people can help have a look at this, >>>>>> the better ;-) >>>>>> >>>>>> PR at https://github.com/jclouds/jclouds/pull/575 >>>>>> >>>>>> Thanks! >>>>>> >>>>>> ap >>>>> >>>