Re: [Openstack] Keystone, pki tokens and memcache

2013-06-17 Thread Adam Young
On 06/17/2013 12:27 AM, Sam Morrison wrote: I'm currently looking into Grizzly and have been having some issues getting PKI tokens to work. If I have memcache as the token backend keystone issues uuid based tokens, if I have sql as the backend then it issues PKI tokens. Does this mean you

Re: [Openstack] Keystone, pki tokens and memcache

2013-06-17 Thread Sam Morrison
On 18/06/2013, at 1:18 AM, Adam Young ayo...@redhat.com wrote: On 06/17/2013 12:27 AM, Sam Morrison wrote: I'm currently looking into Grizzly and have been having some issues getting PKI tokens to work. If I have memcache as the token backend keystone issues uuid based tokens, if I have

[Openstack] Keystone, pki tokens and memcache

2013-06-16 Thread Sam Morrison
I'm currently looking into Grizzly and have been having some issues getting PKI tokens to work. If I have memcache as the token backend keystone issues uuid based tokens, if I have sql as the backend then it issues PKI tokens. Does this mean you can't use memcache backend if you want to use

[Openstack] Keystone PKI support

2012-09-04 Thread boden
Hi, I'm trying to better understand the current status of PKI (http://wiki.openstack.org/PKI) and delegated authZ from a folsom perspective. I can see the blueprint targets folsom-rc1, is marked as implemented (https://blueprints.launchpad.net/keystone/+spec/pki) and I've browsed some of the

Re: [Openstack] Keystone PKI support

2012-09-04 Thread Adam Young
On 09/04/2012 09:36 AM, boden wrote: Hi, I'm trying to better understand the current status of PKI (http://wiki.openstack.org/PKI) and delegated authZ from a folsom perspective. I can see the blueprint targets folsom-rc1, is marked as implemented

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-09 Thread Maru Newby
Hi Adam, The blueprint as revised to address Joe's comments looks good to me - nice work. I especially like how the middleware is intended to cache the revocation list for a configurable amount of time - it mirrors how token caching already works. Cheers, Maru On 2012-08-07, at 10:09 AM,

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-07 Thread Adam Young
On 08/01/2012 09:19 PM, Maru Newby wrote: I see that support for PKI Signed Tokens has been added to Keystone without support for token revocation. I tried to raise this issue on the bug report: https://bugs.launchpad.net/keystone/+bug/1003962/comments/4 And the review:

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-03 Thread Adam Young
On 08/02/2012 10:54 PM, Nathanael Burton wrote: Adam, I haven't yet had a chance to review how the new PKI signed tokens is implemented, but what you're describing sounds quite similar to online certificate status protocol (OCSP) but for tokens. Yes, I don't really have new idea here,

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Joseph Heck
Hey Maru, I think you're putting too many words in Adam's mouth here. First, Adam didnt assert is wasnt valuable, useful, or nessecary - simply that it wasnt in the first cut and not in the list that we agreed was critically essential to an initial implementation. As you noted, its a complex

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Adam Young
On 08/02/2012 01:56 AM, Joseph Heck wrote: Hey Maru, I think you're putting too many words in Adam's mouth here. First, Adam didnt assert is wasnt valuable, useful, or nessecary - simply that it wasnt in the first cut and not in the list that we agreed was critically essential to an initial

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Rouault, Jason (Cloud Services)
: openstack-bounces+jason.rouault=hp@lists.launchpad.net [mailto:openstack-bounces+jason.rouault=hp@lists.launchpad.net] On Behalf Of Maru Newby Sent: Wednesday, August 01, 2012 7:20 PM To: openstack@lists.launchpad.net (openstack@lists.launchpad.net) Subject: [Openstack] Keystone: 'PKI Signed Tokens

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Adam Young
On 08/01/2012 11:05 PM, Maru Newby wrote: Hi Adam, I apologize if my questions were answered before. I wasn't aware that what I perceive as a very serious security concern was openly discussed. The arguments against revocation support, as you've described them, seem to be: - it's

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Maru Newby
Hi Adam, I was thinking along the same lines - the revocation list could be accessed via a simple url. It wouldn't even have to be hosted by Keystone, necessarily. For larger clusters where performance might become an issue, what about generating to a static file as needed that is made

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Maru Newby
Hi Adam, I apologize if I came across as disrespectful. I was becoming frustrated that what I perceived as a valid concern was seemingly being ignored, but I recognize that there is no excuse for addressing you in a manner that I would not myself wish to be treated. I will do better going

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-02 Thread Nathanael Burton
Adam, I haven't yet had a chance to review how the new PKI signed tokens is implemented, but what you're describing sounds quite similar to online certificate status protocol (OCSP) but for tokens. Nate On Aug 2, 2012 10:24 PM, Adam Young ayo...@redhat.com wrote: On 08/01/2012 11:05 PM, Maru

[Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-01 Thread Maru Newby
I see that support for PKI Signed Tokens has been added to Keystone without support for token revocation. I tried to raise this issue on the bug report: https://bugs.launchpad.net/keystone/+bug/1003962/comments/4 And the review: https://review.openstack.org/#/c/7754/ I'm curious as to

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-01 Thread Adam Young
On 08/01/2012 09:19 PM, Maru Newby wrote: I see that support for PKI Signed Tokens has been added to Keystone without support for token revocation. I tried to raise this issue on the bug report: https://bugs.launchpad.net/keystone/+bug/1003962/comments/4 And the review:

Re: [Openstack] Keystone: 'PKI Signed Tokens' lack support for revocation

2012-08-01 Thread Maru Newby
Hi Adam, I apologize if my questions were answered before. I wasn't aware that what I perceive as a very serious security concern was openly discussed. The arguments against revocation support, as you've described them, seem to be: - it's complicated/messy/expensive to implement and/or

Re: [Openstack] [Keystone] PKI

2012-05-16 Thread Tim Bell
-bounces+tim.bell=cern...@lists.launchpad.net] On Behalf Of Adam Young Sent: 16 May 2012 03:10 To: openstack@lists.launchpad.net Subject: Re: [Openstack] [Keystone] PKI Well, the PKI pieces are the same regardless of the CA and certificate issuing pieces. All we will need to do is to use a signing

[Openstack] [Keystone] PKI

2012-05-15 Thread Joseph Heck
Coming out of the Keystone meeting from today (http://eavesdrop.openstack.org/meetings/openstack-meeting/2012/openstack-meeting.2012-05-15-18.02.html), I thought it worth mentioning that adam young has been doing some tremendous lifting in terms of looking at adding in PKI support to Keystone.

Re: [Openstack] [Keystone] PKI

2012-05-15 Thread Razique Mahroua
great topic :) Joseph Heck 15 mai 2012 21:06Coming out of the Keystone meeting from today (http://eavesdrop.openstack.org/meetings/openstack-meeting/2012/openstack-meeting.2012-05-15-18.02.html), I thought it worth mentioning that adam young has been doing some tremendous

Re: [Openstack] [Keystone] PKI

2012-05-15 Thread Thor Wolpert
If you're open to levarging other OSS projects, http://www.ejbca.org/architecture.html us a great one to look at, assuming you need a PKI implementation available. I believe it is at least worth a look. On Tue, May 15, 2012 at 1:30 PM, Razique Mahroua razique.mahr...@gmail.comwrote: great

Re: [Openstack] [Keystone] PKI

2012-05-15 Thread Adam Young
Well, the PKI pieces are the same regardless of the CA and certificate issuing pieces. All we will need to do is to use a signing key to sign a document. So EJBCA or Dogtag will work equally as well. If people already have a CA infrastructure, they should be able to leverage that, too. On

Re: [Openstack] [Keystone] PKI

2012-05-15 Thread Haneef ALI
Hi Adam, Can you please clarify the following in PKI blueprint? 1) Do you assume that roles won't be changed after getToken and before validateToken? !-- if the token contains just the following data : - {username: admiyo,tenant: Fedora,expires: 2359:05May2012, roles: [admin,editor]}