What’s your wiki.apache.org username? I just need to add you to https://wiki.apache.org/jclouds/ContributorsGroup
Everett On Oct 17, 2014, at 9:33 AM, Andrea Turli <andrea.tu...@gmail.com> wrote: > Everett, > > yeah no problem :) > Actually I tried to edit that wiki page some time ago but I couldn't > find my way, then I forgot to ask for help. > > Could you help me? > > Best, > Andrea > > On Fri, Oct 17, 2014 at 4:26 PM, Everett Toews > <everett.to...@rackspace.com> wrote: >> Hi Andrea, >> >> Would you be willing to add yourself as the steward for Softlayer and Docker >> on our Stewards [1] page? >> >> I don’t mean to put you on the spot but I wanted to throw it out there. >> >> Regards, >> Everett >> >> [1] https://wiki.apache.org/jclouds/Stewards >> >> >> On Oct 17, 2014, at 5:19 AM, Andrea Turli <andrea.tu...@gmail.com> wrote: >> >>> +1 (binding) >>> >>> * Executed the validation script: >>> - Source code compiles and passes all tests >>> - There are no RAT violations >>> - Checksums match >>> - Signatures match >>> * All LICENSE and NOTICE files are correct >>> >>> * I ran also LiveTests for Docker and SoftLayer: >>> - SoftLayer: >>> Tests run: 154, Failures: 15, Errors: 0, Skipped: 10 >>> - Docker (still on 1.0 version): >>> Tests run: 38, Failures: 2, Errors: 0, Skipped: 26 >>> >>> For Docker *LiveTests: the provider needs a version bump, Docker >>> continues to push new version out continuously, so the next release >>> will have a best LiveTest coverage and will support latest Docker >>> Engine. >>> >>> Cheers, >>> Andrea >>> >>> On Fri, Oct 17, 2014 at 7:15 AM, Niraj Tolia <nto...@maginatics.com> wrote: >>>> On Thu, Oct 16, 2014 at 10:04 PM, Chris Custine <chris.cust...@gmail.com> >>>> wrote: >>>>> >>>>> On October 16, 2014 at 10:49:33 PM, Niraj Tolia >>>>> (nto...@maginatics.com(mailto:nto...@maginatics.com)) wrote: >>>>>> On Thu, Oct 16, 2014 at 9:43 PM, Chris Custine wrote: >>>>>>> >>>>>>> I am hoping others can confirm this, but after reading the advisory and >>>>>>> several commentaries on it, I can’t think of any way that this exploit >>>>>>> can affect a jclouds client. My interpretation is that in addition to >>>>>>> the man in the middle requirement to force the protocol downgrade to >>>>>>> SSL3 and subsequent packet modification, the exploit also requires some >>>>>>> injection of code onto the client that will cause the client to execute >>>>>>> repeated requests to an endpoint with an incrementing http path length >>>>>>> and decrementing body length. >>>>>>> >>>>>> >>>>>> No, anyone on the network path in between the client and server can >>>>>> initiate this attack. https://www.openssl.org/~bodo/ssl-poodle.pdf and >>>>>> https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html has a >>>>>> lot more context on this but the interesting quote is: >>>>> >>>>> This is the part that enables the exploit of SSL3, but this is not the >>>>> actual exploit. >>>>> >>>>>> >>>>>> So if an attacker that controls the network between the client and the >>>>>> server interferes with any attempted handshake offering TLS 1.0 or >>>>>> later, such clients will readily confine themselves to SSL 3.0. >>>>> >>>>> I understand that part, but this is just initiating the protocol >>>>> downgrade. Downgrading to SSL3 isn’t really the issue, the issue is what >>>>> is done to exploit that. They would still need to initiate many >>>>> specifically formatted requests with varying path and body lengths from >>>>> the *real* client to eventually resolve the encrypted attributes (from a >>>>> jclouds standpoint this would probably be auth headers). This means that >>>>> some part of the response from the actual endpoint would have to have >>>>> some content that causes jclouds itself to go rogue and start making >>>>> these orchestrated requests to nonsense urls, and with body content that >>>>> is decremented to match the incrementing path, and do this many times (up >>>>> to 256 times for each byte) until the server does not reject the SSL. If >>>>> we have an flaw that allows execution of arbitrary script code of some >>>>> variety in jclouds, then I am suddenly worried about a lot more than this >>>>> exploit. :-) >>>>> >>>> >>>> >>>> Ah, I see better what you mean. Yes, from my understanding of POODLE, >>>> there has to be some way for the attacker to be able to get jclouds to >>>> generate URLs in the above scenario. We do not know all the ways in >>>> which jclouds users use the library and if users can control the URLs >>>> (say, for example, using a filename for upload that gets directly >>>> encoded into the filename), I wonder if that is sufficient to launch >>>> the attack. >>>> >>>> Cheers, >>>> Niraj >>>> >>>> >>>>> My 2 cents. >>>>> >>>>> Chris >>>>> >>>>> >>>>>> >>>>>> Cheers, >>>>>> Niraj >>>>>> >>>>>> >>>>>>> >>>>>>> I don’t see any opportunities to inject random script code into a >>>>>>> jclouds client and have it execute in a way similar to javascript in a >>>>>>> browser, and from what I have read, that is what it would take to make >>>>>>> use of this exploit. >>>>>>> >>>>>>> Hopefully other will have the opportunity to interpret this and weigh >>>>>>> in with their insight as well. >>>>>>> >>>>>>> Thanks, >>>>>>> Chris >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> Chris Custine >>>>>>> >>>>>>> >>>>>>> >>>>>>> On October 16, 2014 at 6:20:23 PM, Andrew Phillips >>>>>>> (aphill...@qrmedia.com(mailto:aphill...@qrmedia.com)) wrote: >>>>>>> >>>>>>>>> I prefer to exercise an abundance of caution and extend the vote until >>>>>>>>> we understand the issue. >>>>>>>> >>>>>>>> I wasn't planning to close the vote until we have more details on >>>>>>>> this, indeed. Obviously, the more people can help have a look at this, >>>>>>>> the better ;-) >>>>>>>> >>>>>>>> PR at https://github.com/jclouds/jclouds/pull/575 >>>>>>>> >>>>>>>> Thanks! >>>>>>>> >>>>>>>> ap >>>>>>> >>>>> >>