Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sss and IP/hostname verification #1486

Closed
wyang007 opened this issue Jul 28, 2021 · 4 comments
Closed

sss and IP/hostname verification #1486

wyang007 opened this issue Jul 28, 2021 · 4 comments

Comments

@wyang007
Copy link
Member

Is it possible to disable "sss" ip/hostname verification on the serve side, and/or if a 'sss' key doesn't have IP and/or hostname inside?

@abh3
Copy link
Member

abh3 commented Jul 28, 2021

Actually, that facility already exists but is not described in the way you have envisioned. Not checking the ip/host name makes the token forwardable (that's the primary objective in the explanation). You can already make tokens forwardable by ending the key name with a '+'; see

https://xrootd.slac.stanford.edu/doc/dev50/sec_config.htm#_Toc64492248

especially note 6. The question is whether you want an option to allow this only if the sss token was transmitted using TLS which makes it much harder to steal. It's sort of a toss up because I could have stolen the token off a non-TLS connection and then simply presented it immediately later using TLS which would then make it accepted. So, not much of an improvement in security. In any case, your immediate problem is solvable by using generic forwardable tokens. Let me know.

@wyang007
Copy link
Member Author

I will try the forwardable token option. What is the version of client and server support this feature?

@abh3
Copy link
Member

abh3 commented Jul 28, 2021 via email

@abh3
Copy link
Member

abh3 commented Jul 29, 2021

I am closing this as the issue was resolved.

@abh3 abh3 closed this as completed Jul 29, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants