changelog++
This commit is contained in:
parent
39fe3200e3
commit
9185941f1a
42
CHANGELOG.md
42
CHANGELOG.md
|
@ -1,4 +1,4 @@
|
||||||
## 0.5.3 (Unreleased)
|
## 0.6.0 (Unreleased)
|
||||||
|
|
||||||
SECURITY:
|
SECURITY:
|
||||||
|
|
||||||
|
@ -134,6 +134,46 @@ BUG FIXES:
|
||||||
* secret/pki: Don't check whether a certificate is destined to be a CA
|
* secret/pki: Don't check whether a certificate is destined to be a CA
|
||||||
certificate if sign-verbatim endpoint is used [GH-1250]
|
certificate if sign-verbatim endpoint is used [GH-1250]
|
||||||
|
|
||||||
|
## 0.5.3 (May 27th, 2016)
|
||||||
|
|
||||||
|
SECURITY:
|
||||||
|
|
||||||
|
* Consul ACL Token Revocation: An issue was reported to us indicating that
|
||||||
|
generated Consul ACL tokens were not being properly revoked. Upon
|
||||||
|
investigation, we found that this behavior was reproducible in a specific
|
||||||
|
scenario: when a generated lease for a Consul ACL token had been renewed
|
||||||
|
prior to revocation. In this case, the generated token was not being
|
||||||
|
properly persisted internally through the renewal function, leading to an
|
||||||
|
error during revocation due to the missing token. Unfortunately, this was
|
||||||
|
coded as a user error rather than an internal error, and the revocation
|
||||||
|
logic was expecting internal errors if revocation failed. As a result, the
|
||||||
|
revocation logic believed the revocation to have succeeded when it in fact
|
||||||
|
failed, causing the lease to be dropped while the token was still valid
|
||||||
|
within Consul. In this release, the Consul backend properly persists the
|
||||||
|
token through renewals, and the revocation logic has been changed to
|
||||||
|
consider any error type to have been a failure to revoke, causing the lease
|
||||||
|
to persist and attempt to be revoked later.
|
||||||
|
|
||||||
|
We have written an example shell script that searches through Consul's ACL
|
||||||
|
tokens and looks for those generated by Vault, which can be used as a template
|
||||||
|
for a revocation script as deemed necessary for any particular security
|
||||||
|
response. The script is available at
|
||||||
|
https://gist.github.com/jefferai/6233c2963f9407a858d84f9c27d725c0
|
||||||
|
|
||||||
|
Please note that any outstanding leases for Consul tokens produced prior to
|
||||||
|
0.5.3 that have been renewed will continue to exhibit this behavior. As a
|
||||||
|
result, we recommend either revoking all tokens produced by the backend and
|
||||||
|
issuing new ones, or if needed, a more advanced variant of the provided example
|
||||||
|
could use the timestamp embedded in each generated token's name to decide which
|
||||||
|
tokens are too old and should be deleted. This could then be run periodically
|
||||||
|
up until the maximum lease time for any outstanding pre-0.5.3 tokens has
|
||||||
|
expired.
|
||||||
|
|
||||||
|
This is a security-only release. There are no other code changes since 0.5.2.
|
||||||
|
The binaries have one additional change: they are built against Go 1.6.1 rather
|
||||||
|
than Go 1.6, as Go 1.6.1 contains two security fixes to the Go programming
|
||||||
|
language itself.
|
||||||
|
|
||||||
## 0.5.2 (March 16th, 2016)
|
## 0.5.2 (March 16th, 2016)
|
||||||
|
|
||||||
FEATURES:
|
FEATURES:
|
||||||
|
|
Loading…
Reference in New Issue