Everett, not sure if I have one :) Anyway I think it should be
andreatu...@apache.org Thanks, Andrea On Fri, Oct 17, 2014 at 4:44 PM, Everett Toews <everett.to...@rackspace.com> wrote: > What’s your wiki.apache.org username? > > I just need to add you to https://wiki.apache.org/jclouds/ContributorsGroup > > Everett > > > On Oct 17, 2014, at 9:33 AM, Andrea Turli <andrea.tu...@gmail.com> wrote: > >> Everett, >> >> yeah no problem :) >> Actually I tried to edit that wiki page some time ago but I couldn't >> find my way, then I forgot to ask for help. >> >> Could you help me? >> >> Best, >> Andrea >> >> On Fri, Oct 17, 2014 at 4:26 PM, Everett Toews >> <everett.to...@rackspace.com> wrote: >>> Hi Andrea, >>> >>> Would you be willing to add yourself as the steward for Softlayer and >>> Docker on our Stewards [1] page? >>> >>> I don’t mean to put you on the spot but I wanted to throw it out there. >>> >>> Regards, >>> Everett >>> >>> [1] https://wiki.apache.org/jclouds/Stewards >>> >>> >>> On Oct 17, 2014, at 5:19 AM, Andrea Turli <andrea.tu...@gmail.com> wrote: >>> >>>> +1 (binding) >>>> >>>> * Executed the validation script: >>>> - Source code compiles and passes all tests >>>> - There are no RAT violations >>>> - Checksums match >>>> - Signatures match >>>> * All LICENSE and NOTICE files are correct >>>> >>>> * I ran also LiveTests for Docker and SoftLayer: >>>> - SoftLayer: >>>> Tests run: 154, Failures: 15, Errors: 0, Skipped: 10 >>>> - Docker (still on 1.0 version): >>>> Tests run: 38, Failures: 2, Errors: 0, Skipped: 26 >>>> >>>> For Docker *LiveTests: the provider needs a version bump, Docker >>>> continues to push new version out continuously, so the next release >>>> will have a best LiveTest coverage and will support latest Docker >>>> Engine. >>>> >>>> Cheers, >>>> Andrea >>>> >>>> On Fri, Oct 17, 2014 at 7:15 AM, Niraj Tolia <nto...@maginatics.com> wrote: >>>>> On Thu, Oct 16, 2014 at 10:04 PM, Chris Custine <chris.cust...@gmail.com> >>>>> wrote: >>>>>> >>>>>> On October 16, 2014 at 10:49:33 PM, Niraj Tolia >>>>>> (nto...@maginatics.com(mailto:nto...@maginatics.com)) wrote: >>>>>>> On Thu, Oct 16, 2014 at 9:43 PM, Chris Custine wrote: >>>>>>>> >>>>>>>> I am hoping others can confirm this, but after reading the advisory >>>>>>>> and several commentaries on it, I can’t think of any way that this >>>>>>>> exploit can affect a jclouds client. My interpretation is that in >>>>>>>> addition to the man in the middle requirement to force the protocol >>>>>>>> downgrade to SSL3 and subsequent packet modification, the exploit also >>>>>>>> requires some injection of code onto the client that will cause the >>>>>>>> client to execute repeated requests to an endpoint with an >>>>>>>> incrementing http path length and decrementing body length. >>>>>>>> >>>>>>> >>>>>>> No, anyone on the network path in between the client and server can >>>>>>> initiate this attack. https://www.openssl.org/~bodo/ssl-poodle.pdf and >>>>>>> https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html has a >>>>>>> lot more context on this but the interesting quote is: >>>>>> >>>>>> This is the part that enables the exploit of SSL3, but this is not the >>>>>> actual exploit. >>>>>> >>>>>>> >>>>>>> So if an attacker that controls the network between the client and the >>>>>>> server interferes with any attempted handshake offering TLS 1.0 or >>>>>>> later, such clients will readily confine themselves to SSL 3.0. >>>>>> >>>>>> I understand that part, but this is just initiating the protocol >>>>>> downgrade. Downgrading to SSL3 isn’t really the issue, the issue is >>>>>> what is done to exploit that. They would still need to initiate many >>>>>> specifically formatted requests with varying path and body lengths from >>>>>> the *real* client to eventually resolve the encrypted attributes (from a >>>>>> jclouds standpoint this would probably be auth headers). This means >>>>>> that some part of the response from the actual endpoint would have to >>>>>> have some content that causes jclouds itself to go rogue and start >>>>>> making these orchestrated requests to nonsense urls, and with body >>>>>> content that is decremented to match the incrementing path, and do this >>>>>> many times (up to 256 times for each byte) until the server does not >>>>>> reject the SSL. If we have an flaw that allows execution of arbitrary >>>>>> script code of some variety in jclouds, then I am suddenly worried about >>>>>> a lot more than this exploit. :-) >>>>>> >>>>> >>>>> >>>>> Ah, I see better what you mean. Yes, from my understanding of POODLE, >>>>> there has to be some way for the attacker to be able to get jclouds to >>>>> generate URLs in the above scenario. We do not know all the ways in >>>>> which jclouds users use the library and if users can control the URLs >>>>> (say, for example, using a filename for upload that gets directly >>>>> encoded into the filename), I wonder if that is sufficient to launch >>>>> the attack. >>>>> >>>>> Cheers, >>>>> Niraj >>>>> >>>>> >>>>>> My 2 cents. >>>>>> >>>>>> Chris >>>>>> >>>>>> >>>>>>> >>>>>>> Cheers, >>>>>>> Niraj >>>>>>> >>>>>>> >>>>>>>> >>>>>>>> I don’t see any opportunities to inject random script code into a >>>>>>>> jclouds client and have it execute in a way similar to javascript in a >>>>>>>> browser, and from what I have read, that is what it would take to make >>>>>>>> use of this exploit. >>>>>>>> >>>>>>>> Hopefully other will have the opportunity to interpret this and weigh >>>>>>>> in with their insight as well. >>>>>>>> >>>>>>>> Thanks, >>>>>>>> Chris >>>>>>>> >>>>>>>> >>>>>>>> -- >>>>>>>> Chris Custine >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> On October 16, 2014 at 6:20:23 PM, Andrew Phillips >>>>>>>> (aphill...@qrmedia.com(mailto:aphill...@qrmedia.com)) wrote: >>>>>>>> >>>>>>>>>> I prefer to exercise an abundance of caution and extend the vote >>>>>>>>>> until >>>>>>>>>> we understand the issue. >>>>>>>>> >>>>>>>>> I wasn't planning to close the vote until we have more details on >>>>>>>>> this, indeed. Obviously, the more people can help have a look at this, >>>>>>>>> the better ;-) >>>>>>>>> >>>>>>>>> PR at https://github.com/jclouds/jclouds/pull/575 >>>>>>>>> >>>>>>>>> Thanks! >>>>>>>>> >>>>>>>>> ap >>>>>>>> >>>>>> >>> >