Pithos separate view domain ^^^^^^^^^^^^^^^^^^^^^^^^^^^ This document describes how the Pithos view accesses the protected Pithos resources and proposes a new design for granting access to specific resources. It sketches implementation details and configuration concerns. Abstract ======== We want to serve untrusted user content in a domain which does not have access to sensitive information. Therefore, we would like the Pithos view to be deployed in a domain outside the Astakos cookie domain. We propose a design for the Pithos view to grant access to the access-restricted resource without consulting the cookie. Briefly, the Pithos view will request a short-term access token for a specific resource from Astakos. Before requesting the access token, the view should obtain an authorization grant (authorization code) from Astakos, which will be presented by the view during the request for the access token. The proposed scheme follows the guidelines of the OAuth 2.0 authentication framework as described in http://tools.ietf.org/html/rfc6749/. Current state and shortcomings ============================== Until now, Pithos, in order to identify the user who requests to view a Pithos resource, uses the information stored by Astakos in the cookie after a successful user authentication login. The main drawback of this design is that the Pithos view which serves untrusted user content has access to the sensitive information stored in the Astakos cookie. Proposed changes ================ We propose to alter the Pithos view to obtain authorization according to the authorization code grant flow. The general flow comprises the following steps: #. The user requests to view the content of a protected resource. #. The view requests an authorization code from Astakos by providing its identifier, the requested scope, and a redirection URI. #. Astakos authenticates the user and validates that the redirection URI matches with the registered redirect URIs of the view. Once the Pithos view is considered a trusted client, Astakos grants the access request on behalf of the user. #. Astakos redirects the user-agent back to the view using the redirection URI provided earlier. The redirection URI includes an authorisation code. #. The view requests an access token from Astakos by including the authorisation code in the request. The view also posts its client identifier and its client secret in order to authenticate itself with Astakos. It also supplies the redirection URI used to obtain the authorisation code for verification. #. Astakos authenticates the view, validates the authorization code, and ensures that the redirection URI received matches the URI used to redirect the client. If valid, Astakos responds back with a short-term access token. #. The view exchanges with Astakos the access token for the information of the user to whom the authoritativeness was granted. #. The view responds with the resource contents if the user has access to the specific resource. Implementation details ====================== Pithos view registration to Astakos ----------------------------------- The Pithos view has to authenticate itself with Astakos since the latter has to prevent serving requests by unknown/unauthorized clients. Each OAuth client is identified by a client identifier (``client_id``). Moreover, the confidential clients are authenticated via a password (``client_secret``). Then, each client has to declare at least one redirect URI, so that Astakos will be able to validate the redirect URI provided during the authorization code request. If a client is trusted (like the Pithos view), Astakos grants access on behalf of the resource owner, otherwise the resource owner has to be asked. We register an OAuth 2.0 client with the following command:: snf-manage oauth2-client-add --secret= --is-trusted --url For example:: snf-manage oauth2-client-add pithos-view --secret=12345 --is-trusted --url https://node2.example.com/pithos/ui/view Configure view credentials in Pithos ------------------------------------ We set the credentials used by the Pithos view to authenticate itself with Astakos during the resource access token generation procedure, in the ``PITHOS_OAUTH2_CLIENT_CREDENTIALS`` setting. The value should be a ``(, )`` tuple. For example:: PITHOS_OAUTH2_CLIENT_CREDENTIALS = ("pithos-view", 12345) Authorization code request -------------------------- The view receives a request without either an access token or an authorization code. In that case it redirects to Astakos' authorization endpoint by adding the following parameters to the query component using the ``application/x-www-form-urlencoded`` format: :: response_type: 'code' client_id: 'pithos-view' redirect_uri: the absolute path of the view request scope: the user specific part of the view request path For example, the client directs the user-agent to make the following HTTP request using TLS (with extra line breaks for display purposes only):: GET /astakos/oauth2/auth?response_type=code&client_id=pithos-view &redirect_uri=https%3A//node2.example.com/pithos/ui/view/b0ee4760-9451-4b9a-85f0-605c48bebbdd/pithos/image.png &scope=/b0ee4760-9451-4b9a-85f0-605c48bebbdd/pithos/image.png HTTP/1.1 Host: accounts.synnefo.live Access token request -------------------- Astakos' authorization endpoint responses to a valid authorization code request by redirecting the user-agent back to the requested view (``redirect_uri`` parameter). The view receives the request which includes the authorization code and makes a POST request to the Astakos' token endpoint by sending the following parameters using the ``application/x-www-form-urlencoded`` format in the HTTP request entity-body: :: grant_type: "authorization_code" code: the authorization code received from the Astakos. redirect_uri: the "redirect_uri" parameter was included in the authorization request Since the Pithos view is registered as a confidential client it MUST authenticate with Astakos by providing an Authorization header including the encoded client credentials as described in http://tools.ietf.org/html/rfc2617#page-11. For example, the view makes the following HTTP request using TLS (with extra line breaks for display purposes only):: POST /astakos/oauth2/token HTTP/1.1 Host: accounts.synnefo.live Authorization: Basic cGl0aG9zLXZpZXc6MTIzNDU= Content-Type: application/x-www-form-urlencoded grant_type=authorization_code&code=SplxlOBeZQQYbYS6WxSbIA &redirect_uri=https%3A//node2.example.com/pithos/ui/view/b0ee4760-9451-4b9a-85f0-605c48bebbdd/pithos/image.png Access to the protected resource -------------------------------- Astakos' token endpoint replies to a valid token request with a `200 OK` response:: HTTP/1.1 200 OK Content-Type: application/json;charset=UTF-8 Cache-Control: no-store Pragma: no-cache { "access_token":"2YotnFZFEjr1zCsicMWpAA", "token_type":"Bearer", "expires_in":20 } The view redirects the user-agent to itself by adding to the query component the access token. The view receives the request which includes an access token and requests from Astakos to validate the token by making a GET HTTP request to the Astakos' validation endpoint:: GET /astakos/identity/v2.0/tokens/2YotnFZFEjr1zCsicMWpAA?belongsTo=/b0ee4760-9451-4b9a-85f0-605c48bebbdd/pithos/image.png HTTP/1.1 Host: accounts.synnefo.live The Astakos' validation endpoint checks whether the token is valid, has not expired and that the ``belongsTo`` parameter matches with the ``scope`` parameter that was included in the token request. If not valid returns a `404 NOT FOUND` response. If valid, returns the information of the user to whom the token was assigned. In the former case the view redirects to the requested path (without the access token or the authorization code) in order to re-initiate the procedure by requesting an new authorization code. In the latter case, the view proceeds with the request and if the user has access to the requested resource the resource's data are returned, otherwise the access to the resource is forbidden. Authorization code and access token invalidation ------------------------------------------------ Authorization codes can be used only once (they are deleted after a successful token creation) Token expiration can be set by changing the ``OAUTH2_TOKEN_EXPIRES`` setting. By default it is set to 20 seconds. Tokens granted to a user are deleted after user logout or authentication token renewal. Expired tokens presented to the validation endpoint are also deleted. Authorization code and access token length ------------------------------------------ Authorization code length is adjustable by the ``OAUTH2_AUTHORIZATION_CODE_LENGTH`` setting. By default it is set to 60 characters. Token length is adjustable by the ``OAUTH2_TOKEN_LENGTH`` setting. By default it is set to 30 characters. Restrict file serving endpoints to a specific host -------------------------------------------------- A new setting ``PITHOS_UNSAFE_DOMAIN`` has been introduced. When set, all API views that serve Pithos file contents will be restricted to be served only under the domain specified in the setting value. If an invalid host is identified and request HTTP method is one of ``GET``, ``HEAD``, the server will redirect using a clone of the request with host replaced to the one the restriction applies to.