mirror of
https://github.com/pgsty/minio.git
synced 2026-03-15 17:17:01 +01:00
[security] rpc: Do not transfer access/secret key. (#4857)
This is an improvement upon existing implementation by avoiding transfer of access and secret keys over the network. This change only exchanges JWT tokens generated by an rpc client. Even if the JWT can be traced over the network on a non-TLS connection, this change makes sure that we never really expose the secret key over the network.
This commit is contained in:
committed by
Dee Koder
parent
f680b8482f
commit
f8024cadbb
28
cmd/jwt.go
28
cmd/jwt.go
@@ -63,10 +63,10 @@ func authenticateJWT(accessKey, secretKey string, expiry time.Duration) (string,
|
||||
}
|
||||
|
||||
utcNow := UTCNow()
|
||||
token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, jwtgo.MapClaims{
|
||||
"exp": utcNow.Add(expiry).Unix(),
|
||||
"iat": utcNow.Unix(),
|
||||
"sub": accessKey,
|
||||
token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, jwtgo.StandardClaims{
|
||||
ExpiresAt: utcNow.Add(expiry).Unix(),
|
||||
IssuedAt: utcNow.Unix(),
|
||||
Subject: accessKey,
|
||||
})
|
||||
|
||||
return token.SignedString([]byte(serverCred.SecretKey))
|
||||
@@ -93,13 +93,17 @@ func keyFuncCallback(jwtToken *jwtgo.Token) (interface{}, error) {
|
||||
}
|
||||
|
||||
func isAuthTokenValid(tokenString string) bool {
|
||||
jwtToken, err := jwtgo.Parse(tokenString, keyFuncCallback)
|
||||
var claims jwtgo.StandardClaims
|
||||
jwtToken, err := jwtgo.ParseWithClaims(tokenString, &claims, keyFuncCallback)
|
||||
if err != nil {
|
||||
errorIf(err, "Unable to parse JWT token string")
|
||||
return false
|
||||
}
|
||||
|
||||
return jwtToken.Valid
|
||||
if err = claims.Valid(); err != nil {
|
||||
errorIf(err, "Invalid claims in JWT token string")
|
||||
return false
|
||||
}
|
||||
return jwtToken.Valid && claims.Subject == serverConfig.GetCredential().AccessKey
|
||||
}
|
||||
|
||||
func isHTTPRequestValid(req *http.Request) bool {
|
||||
@@ -110,14 +114,20 @@ func isHTTPRequestValid(req *http.Request) bool {
|
||||
// Returns nil if the request is authenticated. errNoAuthToken if token missing.
|
||||
// Returns errAuthentication for all other errors.
|
||||
func webRequestAuthenticate(req *http.Request) error {
|
||||
jwtToken, err := jwtreq.ParseFromRequest(req, jwtreq.AuthorizationHeaderExtractor, keyFuncCallback)
|
||||
var claims jwtgo.StandardClaims
|
||||
jwtToken, err := jwtreq.ParseFromRequestWithClaims(req, jwtreq.AuthorizationHeaderExtractor, &claims, keyFuncCallback)
|
||||
if err != nil {
|
||||
if err == jwtreq.ErrNoTokenInRequest {
|
||||
return errNoAuthToken
|
||||
}
|
||||
return errAuthentication
|
||||
}
|
||||
|
||||
if err = claims.Valid(); err != nil {
|
||||
return err
|
||||
}
|
||||
if claims.Subject != serverConfig.GetCredential().AccessKey {
|
||||
return errInvalidAccessKeyID
|
||||
}
|
||||
if !jwtToken.Valid {
|
||||
return errAuthentication
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user