Jump to: navigation, search

Difference between revisions of "OSSN/OSSN-0037"

(Created page with "__NOTOC__ == Configure Horizon to mitigate BREACH/CRIME attacks == === Summary === Horizon is vulnerable to BREACH/CRIME style chosen plaintext attacks in it's default confi...")
 
m (Contacts / References)
 
Line 40: Line 40:
  
 
=== Contacts / References ===
 
=== Contacts / References ===
 +
* Author: Robert Clark, HP
 
* This OSSN : https://wiki.openstack.org/wiki/OSSN/OSSN-0037
 
* This OSSN : https://wiki.openstack.org/wiki/OSSN/OSSN-0037
 
* Original LaunchPad Bug : https://bugs.launchpad.net/ossn/+bug/1209250
 
* Original LaunchPad Bug : https://bugs.launchpad.net/ossn/+bug/1209250

Latest revision as of 09:48, 22 July 2016


Configure Horizon to mitigate BREACH/CRIME attacks

Summary

Horizon is vulnerable to BREACH/CRIME style chosen plaintext attacks in it's default configuration.

Affected Services / Software

Horizon, Django, Apache, Nginx, SSL, TLS

Discussion

The BREACH attack may be used to compromise Django's cross-site request forgery (CSRF) protection. OpenStack's Horizon web dashboard is built on the Django framework, and is consequently affected. There is no fix available in Horizon itself, but there are protection options.

BREACH takes advantage of vulnerabilities when serving compressed data over SSL/TLS.

Recommended Actions

Since BREACH is related to serving compressed data, disabling compression of web responses can be used to mitigate these type of attacks. Some methods for this include:

Disable Django's GZIP Middleware:


Disable GZip compression in your web server's config. For Apache httpd, you can do this by disabling mod_deflate:


For Nginx, you can do this by disabling the gzip module:

Contacts / References