-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
change MD5 to SHA256 #15
Conversation
@jvanderhoof |
@shaharglazner, @nahumcohen, let's make sure this change doesn't cause any issues in
The above will install Slosilo from source. Full Bundler details are available here: https://bundler.io/guides/git.html. After updating the gem reference in Conjur, we'll need to run Assuming tests passed, we'll need to release a new version of Slosilo (the core team can handle that). The final step will be to bump the Slosilo version in |
@jvanderhoof The cyberark/conjur consuming slosilo with the fix (https://jenkins.conjur.net/blue/organizations/jenkins/cyberark--conjur/detail/openssl-1.0.2/2/pipeline/408) is done on the openssl-1.0.2 branch (https://github.com/cyberark/conjur/tree/openssl-1.0.2). |
@nahumcohen: Could you please provide a more detailed description about this change and why it's being made? Answers to the following would be great:
Thanks. |
|
I don't believe this is a breaking change as authentication tokens are short-lived (eight minutes). Connections would need to re-authenticate after the upgrade, but they need to do this regularly as part of basic operation. |
@nahumcohen, can you please create a branch of
with:
in the Gemfile, running If tests pass on the branch of Conjur using this code, I'm comfortable releasing this change. |
@jvanderhoof: Regarding your comment above about this change, are you saying that after upgrade, existing JWT tokens wouldn't be valid, but this is significantly mitigated by the fact that they are short lived? I assume that applies to both Conjur and DAP? 8 minutes isn't long, but it's also not short in machine time. Can anything else be done to mitigate this? |
@alexkalish @jvanderhoof |
@alexkalish @jvanderhoof |
@uCatu @nahumcohen: Based on your comments, it sounds like there is a gap in the upgrade UX for OSS, right? I get that we don't have a documented upgrade process now, but we at least need to have a feature in the product that allows users to upgrade. What would you recommend? |
I have only a moderately high level of understanding of the details of Slosilo and it's role in sessions. If you have concerns (which it sounds like you do), I'd strongly recommend validating the proposed change between versions. If there are any issues, you'll need to document the upgrade path as @alexkalish suggested. |
@alexkalish We agree that the OSS upgrade should be documented/have a feature. |
@jvanderhoof We are taking the OSS upgrade process offline with @alexkalish. |
FWIW, hash strength here doesn't matter at all. The hash is only there as a hint to identify a key instead of trying them all one by one; if the key doesn't match (regardless of whether the hash matches), the signature verification will simply fail. If there is more than one key that matches the hash, all of them will be tried (as far as I remember). AFAIR I picked MD5 just because it makes for a shorter token. Could just as well have been a random string, or a random number, or anything, or nothing. Using a hash makes it easier because you don't have to store an additional identifier along with the key. |
@dividedmind |
Ah, fair, that makes sense, thanks @shaharglazner! In this case perhaps you should consider simply dropping in Ruby's built-in |
@dividedmind
|
@nahumcohen: Leaving the OSS upgrade changes/documentation for later is fine with me, assuming that it doesn't require changes should be made in this branch. Could you please create an issue in |
@alexkalish: Added existing issue in the PR description |
@nahumcohen, can you please link to the passing tests on |
@jvanderhoof |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
The change of MD5 to SHA256 is required for the FIPS complaint requirements.
Should pay attention to
Outstanding work related to cyberark/conjur#1528