[Yahoo-eng-team] [Bug 2027729] [NEW] Federation docs for OIDC recommend implicit grant

2023-07-13 Thread Kristi Nikolla
Public bug reported:

The documentation for setting up OIDC says to use id_token in
OIDCResponseType instead of code (or omitting the line entirely since
code is the default).

https://docs.openstack.org/keystone/latest/admin/federation/configure_federation.html#configuring-
apache-httpd-for-mod-auth-openidc

Using implicit grant is not recommended as
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-
topics-09

What is recommended is Authorization Code with PKCE.

** Affects: keystone
 Importance: Undecided
 Status: Triaged


** Tags: documentation federation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/2027729

Title:
  Federation docs for OIDC recommend implicit grant

Status in OpenStack Identity (keystone):
  Triaged

Bug description:
  The documentation for setting up OIDC says to use id_token in
  OIDCResponseType instead of code (or omitting the line entirely since
  code is the default).

  
https://docs.openstack.org/keystone/latest/admin/federation/configure_federation.html#configuring-
  apache-httpd-for-mod-auth-openidc

  Using implicit grant is not recommended as
  https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-
  topics-09

  What is recommended is Authorization Code with PKCE.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/2027729/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1786646] Re: Domain Existence Leaking without authentication

2020-06-30 Thread Kristi Nikolla
** Changed in: keystone
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1786646

Title:
  Domain Existence Leaking without authentication

Status in OpenStack Identity (keystone):
  Won't Fix
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  The Domain Configuration subsystem, specifically PATCH
  /domains/{domain_id}/config/{group} appears to leak data before
  enforcement. The method called from the routed path[0] performs a
  "domain exists" check[1] before sending to the 'update_domain_config'
  method [2] which is behind the @protected decorator.

  This has the potential to be used to verify existence of domains by ID
  without authentication. This is in-fact a data leak. However, since
  domains (outside of "default" and the keystone-root domain) are uuids,
  this is likely a C1 classification in the VMT Taxonomy [3] (Useful if
  an attacker is guessing UUIDs). The only case where this is more
  significant is that it can be used to determine if the default domain
  is enabled/configured; the usefulness of such data is relatively
  suspect and unlikely to be meaningful.

  However, with all that said, since this is a potential security flaw,
  the bug has been marked private security.

  [0] 
https://github.com/openstack/keystone/blob/c7ae6b798ad4b2164ed6248f1714ec44b27edb7a/keystone/resource/routers.py#L55
  [1] 
https://github.com/openstack/keystone/blob/c7ae6b798ad4b2164ed6248f1714ec44b27edb7a/keystone/resource/controllers.py#L134
  [2] 
https://github.com/openstack/keystone/blob/c7ae6b798ad4b2164ed6248f1714ec44b27edb7a/keystone/resource/controllers.py#L125-L131
  [3] https://security.openstack.org/vmt-process.html#incident-report-taxonomy

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1786646/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877720] Re: test-bug

2020-05-19 Thread Kristi Nikolla
** Changed in: keystone
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1877720

Title:
  test-bug

Status in OpenStack Identity (keystone):
  Invalid

Bug description:
  ss

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1877720/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877709] Re: test-bug

2020-05-19 Thread Kristi Nikolla
** Changed in: keystone
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1877709

Title:
  test-bug

Status in OpenStack Identity (keystone):
  Invalid

Bug description:
  I am noly want to test

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1877709/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1856190] Re: Logout button for use with SSO/Mellon based integrations

2019-12-13 Thread Kristi Nikolla
Hi Lorenzo, this is was a Horizon bug and is being tracked here.
https://bugs.launchpad.net/horizon/+bug/1747149

** Changed in: keystone
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1856190

Title:
  Logout button for use with SSO/Mellon based integrations

Status in OpenStack Identity (keystone):
  Invalid

Bug description:
  Keystone WebSSO - SAML/Mellon integration

  Looks like the Horizon logout doesn't affect the IdP session which is
  not invalidated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1856190/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1809116] [NEW] Renewable Application Credentials

2018-12-19 Thread Kristi Nikolla
Public bug reported:

This bug is used for tracking the progress of the application credential
feature in keystone.

Summary
===
Allow creation of applications credentials based on the authorization of mapped 
group assignments. The application credentials will require the user who 
created the application credential to log in with the same authorization in the 
external identity provider, in order to renew it.

** Affects: keystone
 Importance: Undecided
 Assignee: Kristi Nikolla (knikolla)
 Status: New


** Tags: federation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1809116

Title:
  Renewable Application Credentials

Status in OpenStack Identity (keystone):
  New

Bug description:
  This bug is used for tracking the progress of the application
  credential feature in keystone.

  Summary
  ===
  Allow creation of applications credentials based on the authorization of 
mapped group assignments. The application credentials will require the user who 
created the application credential to log in with the same authorization in the 
external identity provider, in order to renew it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1809116/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1776161] Re: my own test bug

2018-06-12 Thread Kristi Nikolla
** Changed in: keystone
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1776161

Title:
  my own test bug

Status in OpenStack Identity (keystone):
  Invalid

Bug description:
  a bug for test by myself

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1776161/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1760205] [NEW] A deleted federated user cannot be recreated for some time

2018-03-30 Thread Kristi Nikolla
Public bug reported:

When you delete a shadow user and the user tries to log in again through
federation, they'll get a can't find user error. Retrying after 10 (or
so) minutes works.

My Setup

1. devstack-idp is the identity provider for service provider devstack-sp1, 
using Keystone to Keystone (SAML) with Shibboleth
2. user-idp gets a SAML assertion from devstack-idp keystone and uses that to 
authenticate with devstack-sp1 keystone.
3. devstack-sp1 create shadow user user-sp1.
4. admin deletes user-sp1 in devstack-sp1.
5. Step two is performed again
6. user-idp gets a 'Could not find user ' from devstack-sp1.
7. After 10 (or so) minutes user tries again, this time it works and he is able 
to authenticate to  (id of this user-sp1 is different than the prior 
one).

** Affects: keystone
 Importance: Undecided
 Status: New


** Tags: federation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1760205

Title:
  A deleted federated user cannot be recreated for some time

Status in OpenStack Identity (keystone):
  New

Bug description:
  When you delete a shadow user and the user tries to log in again
  through federation, they'll get a can't find user error. Retrying
  after 10 (or so) minutes works.

  My Setup
  
  1. devstack-idp is the identity provider for service provider devstack-sp1, 
using Keystone to Keystone (SAML) with Shibboleth
  2. user-idp gets a SAML assertion from devstack-idp keystone and uses that to 
authenticate with devstack-sp1 keystone.
  3. devstack-sp1 create shadow user user-sp1.
  4. admin deletes user-sp1 in devstack-sp1.
  5. Step two is performed again
  6. user-idp gets a 'Could not find user ' from devstack-sp1.
  7. After 10 (or so) minutes user tries again, this time it works and he is 
able to authenticate to  (id of this user-sp1 is different than the 
prior one).

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1760205/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1754048] [NEW] Federated domain is reported when validating a federated token

2018-03-07 Thread Kristi Nikolla
Public bug reported:

Prior to introducing per idp domains, all federated users lived in the
Federated domain. That is not the case anymore but Keystone keeps
reporting that federated users are part of that domain rather their per-
idp domains.

Token validation: http://paste.openstack.org/show/693652/

** Affects: keystone
 Importance: Undecided
 Status: New


** Tags: federation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1754048

Title:
  Federated domain is reported when validating a federated token

Status in OpenStack Identity (keystone):
  New

Bug description:
  Prior to introducing per idp domains, all federated users lived in the
  Federated domain. That is not the case anymore but Keystone keeps
  reporting that federated users are part of that domain rather their
  per-idp domains.

  Token validation: http://paste.openstack.org/show/693652/

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1754048/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1747149] [NEW] LOGOUT_URL setting has no effect

2018-02-03 Thread Kristi Nikolla
Public bug reported:

Setting LOGOUT_URL in `etc/openstack-dashboard/local_settings.py` has no
effect on the URL displayed in the dropdown menu. It still points to
`/dashboard/auth/logout/`.

Setting this value is important when using SSO so as to redirect the
user to the SSO logout page, and then having that page redirect the user
back to `/dashboard/auth/logout/` to unset the session cookies.

I'm currently doing a workaround where I alias that path in the apache
configuration, unset the headers, and redirect the user to my SSO logout
page.

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1747149

Title:
  LOGOUT_URL setting has no effect

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Setting LOGOUT_URL in `etc/openstack-dashboard/local_settings.py` has
  no effect on the URL displayed in the dropdown menu. It still points
  to `/dashboard/auth/logout/`.

  Setting this value is important when using SSO so as to redirect the
  user to the SSO logout page, and then having that page redirect the
  user back to `/dashboard/auth/logout/` to unset the session cookies.

  I'm currently doing a workaround where I alias that path in the apache
  configuration, unset the headers, and redirect the user to my SSO
  logout page.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1747149/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1738895] [NEW] Filtering by name doesn't work for federated users when listing

2017-12-18 Thread Kristi Nikolla
Public bug reported:

When attempting to filter users by name, it works for local users, but
doesn't work for federated users.

Pasted shell session shows:

1. Listing all users shows federated users too.
2. Filtering by name a federated user doesn't work.
3. Filtering by name a local user works.

http://paste.openstack.org/show/629249/

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1738895

Title:
  Filtering by name doesn't work for federated users when listing

Status in OpenStack Identity (keystone):
  New

Bug description:
  When attempting to filter users by name, it works for local users, but
  doesn't work for federated users.

  Pasted shell session shows:

  1. Listing all users shows federated users too.
  2. Filtering by name a federated user doesn't work.
  3. Filtering by name a local user works.

  http://paste.openstack.org/show/629249/

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1738895/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696111] Re: Keystone confuses users when creating a trust when there's a roles name conflict

2017-06-14 Thread Kristi Nikolla
Also affects python-keystoneclient as it only support names. [0]
Agree that the correct solution is to allow ids also.

0. https://github.com/openstack/python-
keystoneclient/blob/71af540c81ecb933d912ef5ecde128afcc0deeeb/keystoneclient/v3/contrib/trusts.py#L41

** Also affects: python-keystoneclient
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1696111

Title:
  Keystone confuses users when creating a trust when there's a roles
  name conflict

Status in OpenStack Identity (keystone):
  Triaged
Status in python-keystoneclient:
  New
Status in python-openstackclient:
  New

Bug description:
  Due to code [1] Keystone produces a confusing message when:

  * We're using python-openstackclient
  * We're creating a trust with a role name that exists in more that one domain.

  "role %s is not defined" suggests that there isn't a role like that.
  What actually happens, Keystone cannot decide which role is the user's
  choice.

  python-openstackclient automatically converts role ids to role names
  when sending a POST request, so specifying roles using an id doesn't
  help at all.


  [1]
  
https://github.com/openstack/keystone/blob/03319d1/keystone/trust/controllers.py#L90-L94

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1696111/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1676497] [NEW] bindep returns wrong package name for libssl-dev in redhat

2017-03-27 Thread Kristi Nikolla
Public bug reported:

The libssl-dev package is registered in bindep.txt for both ubuntu and
rpm distros. The actual name of the package in red hat distros is
openssl-devel.

[fedora@desire keystone]$ bindep platform:rpm
Missing packages:
libssl-dev

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1676497

Title:
  bindep returns wrong package name for libssl-dev in redhat

Status in OpenStack Identity (keystone):
  New

Bug description:
  The libssl-dev package is registered in bindep.txt for both ubuntu and
  rpm distros. The actual name of the package in red hat distros is
  openssl-devel.

  [fedora@desire keystone]$ bindep platform:rpm
  Missing packages:
  libssl-dev

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1676497/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1544721] [NEW] Policy for listing service providers requires admin

2016-02-11 Thread Kristi Nikolla
Public bug reported:

When creating a v3 keystoneclient using non admin credentials I'm able
to get the list of service providers from the service catalog, but the
policy doesn't allow to list or get service providers by default.

>>> ksclient2.service_catalog.catalog[u'service_providers']
[{u'sp_url': u'http://xxx.xxx.xxx.xxx:5000/Shibboleth.sso/SAML2/ECP', 
u'auth_url': 
u'http://xxx.xxx.xxx.xxx:35357/v3/OS-FEDERATION/identity_providers/keystone-idp/protocols/saml2/auth',
 u'id': u'keystone-sp'}]

>>> ksclient2.federation.service_providers.list()
Traceback (most recent call last):
  File "", line 1, in 
  File 
"/usr/local/lib/python2.7/dist-packages/keystoneclient/v3/contrib/federation/service_providers.py",
 line 76, in list
return super(ServiceProviderManager, self).list(**kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/base.py", line 
75, in func
return f(*args, **new_kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/base.py", line 
388, in list
self.collection_key)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/base.py", line 
124, in _list
resp, body = self.client.get(url, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/adapter.py", line 
170, in get
return self.request(url, 'GET', **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/adapter.py", line 
206, in request
resp = super(LegacyJsonAdapter, self).request(*args, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/adapter.py", line 
95, in request
return self.session.request(url, method, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/utils.py", line 
337, in inner
return func(*args, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneclient/session.py", line 
405, in request
raise exceptions.from_response(resp, method, url)
keystoneauth1.exceptions.http.Forbidden: You are not authorized to perform the 
requested action: identity:list_service_providers (Disable debug mode to 
suppress these details.) (HTTP 403) (Request-ID: 
req-485c64e6-5de1-4470-9439-e05275a350fa)

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1544721

Title:
  Policy for listing service providers requires admin

Status in OpenStack Identity (keystone):
  New

Bug description:
  When creating a v3 keystoneclient using non admin credentials I'm able
  to get the list of service providers from the service catalog, but the
  policy doesn't allow to list or get service providers by default.

  >>> ksclient2.service_catalog.catalog[u'service_providers']
  [{u'sp_url': u'http://xxx.xxx.xxx.xxx:5000/Shibboleth.sso/SAML2/ECP', 
u'auth_url': 
u'http://xxx.xxx.xxx.xxx:35357/v3/OS-FEDERATION/identity_providers/keystone-idp/protocols/saml2/auth',
 u'id': u'keystone-sp'}]

  >>> ksclient2.federation.service_providers.list()
  Traceback (most recent call last):
File "", line 1, in 
File 
"/usr/local/lib/python2.7/dist-packages/keystoneclient/v3/contrib/federation/service_providers.py",
 line 76, in list
  return super(ServiceProviderManager, self).list(**kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/base.py", line 
75, in func
  return f(*args, **new_kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/base.py", line 
388, in list
  self.collection_key)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/base.py", line 
124, in _list
  resp, body = self.client.get(url, **kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/adapter.py", 
line 170, in get
  return self.request(url, 'GET', **kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/adapter.py", 
line 206, in request
  resp = super(LegacyJsonAdapter, self).request(*args, **kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/adapter.py", 
line 95, in request
  return self.session.request(url, method, **kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/utils.py", line 
337, in inner
  return func(*args, **kwargs)
File "/usr/local/lib/python2.7/dist-packages/keystoneclient/session.py", 
line 405, in request
  raise exceptions.from_response(resp, method, url)
  keystoneauth1.exceptions.http.Forbidden: You are not authorized to perform 
the requested action: identity:list_service_providers (Disable debug mode to 
suppress these details.) (HTTP 403) (Request-ID: 
req-485c64e6-5de1-4470-9439-e05275a350fa)

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1544721/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe :