Pre-Signed URLs¶
https://blueprints.launchpad.net/zaqar/+spec/pre-signed-url
There’s a need to have pre-signed URLs - ala Swift’s tempURL - that would grant temporary access, to non-authenticated users, to specific queues.
Problem description¶
In cases where there’s a need to allow “outsiders” of the system - i.e guest-agents - to interact with Zaqar, it’s useful to have a way to grant them access so that they can do whatever is needed without giving these “outsiders” a username and password or any other kind of permission in the system.
This access, however, needs to be temporary, revocable and granular. Outsiders shouldn’t get access to more than 1 resource at a time and the permissions granted should identify what kind of operations they can execute.
Proposed change¶
The proposed solution to the aforementioned problem is to use pre-signed URLs. Services like Swift use a similar approach - called temp URL there - to provide access to internal resources. The pre-signed URL consists of a URL that contains a hash with the encoded permissions.
In order to make it easier to read/write this spec, let’s split it in several parts. The first part will describe the parts composing the URL. The second part will describe how the URL will be generated and the third part how it’ll be consumed.
Pre-Signed URL¶
A pre-signed URL ought to contain enough information for it to provide enough control over the resource being shared, without compromising security. Authorization is a must have and a huge part of this URL. Therefore, the information present in this URL has to be exhaustive in that perspective.
As mentioned in a previous paragraph, the URL contains a hashed piece of information that serializes the required fields. Those fields are:
Project: The keystone tenant of the entity generating the URL
TTL: Expiration time (in seconds) for the URL
Queue: Zaqar’s queue name that this URL gives access to
HTTP Method: The HTTP method(s) this URL was created for. By selecting the HTTP method, it’s possible to give either read or read/write access to a specific resource.
The above fields will be part of the generated hash but they’ll also be available as public information in the URL. The reason they’re encoded is to have a way to verify that the URL has not been changed by the user whenever a request is made to Zaqar.
The generated hash will be an HMAC-SHA1. To generate such signature, it is required to have a secret key. In swift, it’s possible to have a key per-account. Unfortunately, that’s not possible in Zaqar + Keystone, therefore this spec proposes adding a new configuration option that will contain the key to use.:
[signed_url]
secret_key = some-very-strong-key
URL Generation¶
This spec proposes adding a new endpoint in the queue namespace that returns the generated signature and expiration time that’ll grant access to this resource. The request and response for this operation:
Request::
POST /v2/queues/shared_queue/share HTTP/1.1
...
{
'methods': ['GET', 'POST']
}
Response::
HTTP/1.0 201 OK
...
{
'signature': '518b51ea133c4facadae42c328d6b77b',
'expires': 2015-05-31T19:00:17Z,
'project': '7d2f63fd4dcc47528e9b1d08f989cc00',
'url': '/v2/queues/shared_queue/messages',
'methods': ['GET', 'POST']
}
This request sets a different expiration date for the URL. Note that the default method is GET.
Request::
POST /v2/queues/shared_queue/share HTTP/1.1
...
{
'expires': 2015-06-19T19:00:00Z
}
Response::
HTTP/1.0 201 OK
...
{
'signature': '518b51ea133c4facadae42c328d6b77b',
'expires': 2015-06-19T19:00:00Z,
'project': '7d2f63fd4dcc47528e9b1d08f989cc00',
'url': '/v2/queues/shared_queue/messages'
'methods': ['GET']
}
This request combines both parameters (methods and expires):
Request::
POST /v2/queues/shared_queue/share HTTP/1.1
...
{
'methods': ['GET', 'POST'],
'expires': 2015-06-19T19:00:00Z
}
Response::
HTTP/1.0 201 OK
...
{
'signature': '518b51ea133c4facadae42c328d6b77b',
'expires': 2015-06-19T19:00:00Z,
'project': '7d2f63fd4dcc47528e9b1d08f989cc00',
'url': '/v2/queues/shared_queue/messages'
'methods': ['GET', 'POST']
}
Consuming the URL¶
First and foremost, it’s important to mention that NONE of the URL headers can/should be modified and/or omitted. As soon as one of them is, the signature verification will fail and therefore the request will respond 404.
Requests for pre-signed URLs will be processed by a middleware that should be placed before keystone’s middleware. This will allow us to authenticate the request in advance and skip keystone’s authentication. A request using the signature generated in the previous section would look like:
Request::
GET /v2/queues/shared_queue/messages HTTP/1.1
Host: zaqar.example.com
User-Agent: python/2.7 killer-rabbit/1.2
Date: Wed, 28 Nov 2012 21:14:19 GMT
Accept: application/json
Accept-Encoding: gzip
URL-Signature: 518b51ea133c4facadae42c328d6b77b
URL-Expires: 2015-05-31T19:00:17Z
X-Project-Id: 7d2f63fd4dcc47528e9b1d08f989cc00
Client-ID: 30387f00-39a0-11e2-be4d-a8d15f34bae2
Note that, in the above example, headers were chosen over query parameters. The main 2 reasons behind this choice are:
1. Consistency with other security related parameters - i.e X-Project-Id - that are sent in HTTP headers.
2. These new parameters don’t belong in the messages request and won’t affect messages navigation.
Similarly, other requests like the one below can be done.
Request::
GET /v2/queues/shared_queue/messages?marker=1355-237242-783&limit=10 HTTP/1.1
Host: zaqar.example.com
User-Agent: python/2.7 killer-rabbit/1.2
Date: Wed, 28 Nov 2012 21:14:19 GMT
Accept: application/json
Accept-Encoding: gzip
URL-Signature: 518b51ea133c4facadae42c328d6b77b
URL-Expires: 2015-05-31T19:00:17Z
X-Project-Id: 7d2f63fd4dcc47528e9b1d08f989cc00
Client-ID: 30387f00-39a0-11e2-be4d-a8d15f34bae2
Filtering and pagination are not part of the signature and fall into the read permissions that were granted on this.
Posting messages will work the same way:
Request::
POST /v2/queues/shared_queue/messages HTTP/1.1
Host: zaqar.example.com
User-Agent: python/2.7 killer-rabbit/1.2
Date: Wed, 28 Nov 2012 21:14:19 GMT
Accept: application/json
Accept-Encoding: gzip
URL-Signature: 518b51ea133c4facadae42c328d6b77b
URL-Expires: 2015-05-31T19:00:17Z
X-Project-Id: 7d2f63fd4dcc47528e9b1d08f989cc00
Client-ID: 30387f00-39a0-11e2-be4d-a8d15f34bae2
...
Other Notes¶
In the case of pre-signed URLs, the queue cannot be created lazily. This is to prevent cases where queues are deleted and users still have a valid URL. This is not a big issues in cases where there’s just 1 pool. However, if there’s a deployment using more than 1 type of pool, the lazily created queue may end up in an undesired pool and it’d be possible for an attacker to try a DoS on that pool. Therefore, whenever a pre-signed URL is created, if a pool doesn’t exist, one will be created.
I’m not a fan of passing the project-id around but I can’t think of another way to do this and still have the ability to preserve multi-tenancy without passing the project.
I don’t like having the key set in the config file. In future versions, we could think of making this information part of the queue itself. The reason we can’t do that right now is because we don’t have private fields in the metadata. It should be easy enough to do it as an enhancement for this feature.
As a future enhancement, we could also use Barbican for key management.
Drawbacks¶
Security issues may be added by this work. We ought to be extra careful on reviews and create a vulnerability team that is ready to address any issues that might come up.
Alternatives¶
None
Implementation¶
Assignee(s)¶
- Primary assignee:
flaper87
Work Items¶
Write utilities to generate the signature with proper tests
Add the endpoint that generates the pre-signed URL
Create a middleware capable of processing these URL
Dependencies¶
None
Note
This work is licensed under a Creative Commons Attribution 3.0 Unported License. http://creativecommons.org/licenses/by/3.0/legalcode