all lists on lists.proxmox.com
 help / color / mirror / Atom feed
* [pve-devel] [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048
@ 2022-06-15 14:09 Mira Limbeck
  2022-06-17  8:42 ` Wolfgang Bumiller
  2022-06-23  9:46 ` [pve-devel] applied: " Wolfgang Bumiller
  0 siblings, 2 replies; 4+ messages in thread
From: Mira Limbeck @ 2022-06-15 14:09 UTC (permalink / raw)
  To: pve-devel

Azure AD seems to have a variable authorization code size, depending on
the browser state according to one report in bug #4074 [0].

Sometimes the size is greater than our current limit of 1024, so
increase it to 2048.

The RFC [1] mentions that there is no limit to the code size, but based on
current experience, a size limit of 2048 might be enough for every
current OpenID Connect provider.

[0] https://bugzilla.proxmox.com/show_bug.cgi?id=4074
[1] https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.2

Signed-off-by: Mira Limbeck <m.limbeck@proxmox.com>
---
The PBS implementation doesn't seem to be using any code size limit, do
we want to remove it entirely in PVE as well?

 src/PVE/API2/OpenId.pm | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/PVE/API2/OpenId.pm b/src/PVE/API2/OpenId.pm
index c838b2c..8653d61 100644
--- a/src/PVE/API2/OpenId.pm
+++ b/src/PVE/API2/OpenId.pm
@@ -134,7 +134,7 @@ __PACKAGE__->register_method ({
 	    code => {
 		description => "OpenId authorization code.",
 		type => 'string',
-		maxLength => 1024,
+		maxLength => 2048,
             },
 	    'redirect-url' => {
 		description => "Redirection Url. The client should set this to the used server url (location.origin).",
-- 
2.30.2





^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [pve-devel] [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048
  2022-06-15 14:09 [pve-devel] [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048 Mira Limbeck
@ 2022-06-17  8:42 ` Wolfgang Bumiller
  2022-06-20  9:11   ` Mira Limbeck
  2022-06-23  9:46 ` [pve-devel] applied: " Wolfgang Bumiller
  1 sibling, 1 reply; 4+ messages in thread
From: Wolfgang Bumiller @ 2022-06-17  8:42 UTC (permalink / raw)
  To: Mira Limbeck; +Cc: pve-devel

On Wed, Jun 15, 2022 at 04:09:50PM +0200, Mira Limbeck wrote:
> Azure AD seems to have a variable authorization code size, depending on
> the browser state according to one report in bug #4074 [0].
> 
> Sometimes the size is greater than our current limit of 1024, so
> increase it to 2048.

Would there be any downside to just going straight to 4 or 8K here?

> 
> The RFC [1] mentions that there is no limit to the code size, but based on
> current experience, a size limit of 2048 might be enough for every
> current OpenID Connect provider.
> 
> [0] https://bugzilla.proxmox.com/show_bug.cgi?id=4074
> [1] https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.2
> 
> Signed-off-by: Mira Limbeck <m.limbeck@proxmox.com>
> ---
> The PBS implementation doesn't seem to be using any code size limit, do
> we want to remove it entirely in PVE as well?
> 
>  src/PVE/API2/OpenId.pm | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/src/PVE/API2/OpenId.pm b/src/PVE/API2/OpenId.pm
> index c838b2c..8653d61 100644
> --- a/src/PVE/API2/OpenId.pm
> +++ b/src/PVE/API2/OpenId.pm
> @@ -134,7 +134,7 @@ __PACKAGE__->register_method ({
>  	    code => {
>  		description => "OpenId authorization code.",
>  		type => 'string',
> -		maxLength => 1024,
> +		maxLength => 2048,
>              },
>  	    'redirect-url' => {
>  		description => "Redirection Url. The client should set this to the used server url (location.origin).",
> -- 
> 2.30.2




^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [pve-devel] [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048
  2022-06-17  8:42 ` Wolfgang Bumiller
@ 2022-06-20  9:11   ` Mira Limbeck
  0 siblings, 0 replies; 4+ messages in thread
From: Mira Limbeck @ 2022-06-20  9:11 UTC (permalink / raw)
  To: Wolfgang Bumiller; +Cc: pve-devel

On 6/17/22 10:42, Wolfgang Bumiller wrote:
> On Wed, Jun 15, 2022 at 04:09:50PM +0200, Mira Limbeck wrote:
>> Azure AD seems to have a variable authorization code size, depending on
>> the browser state according to one report in bug #4074 [0].
>>
>> Sometimes the size is greater than our current limit of 1024, so
>> increase it to 2048.
> Would there be any downside to just going straight to 4 or 8K here?
>
I don't think so. I just went with the usual `increase it to handle the 
current requirements` approach here.

If you prefer a higher limit then sure, I'll send a v2 with 4k or 8k.

The mentions in the bug tracker/forum post were of code sizes about 
1100-1300 in length.





^ permalink raw reply	[flat|nested] 4+ messages in thread

* [pve-devel] applied: [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048
  2022-06-15 14:09 [pve-devel] [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048 Mira Limbeck
  2022-06-17  8:42 ` Wolfgang Bumiller
@ 2022-06-23  9:46 ` Wolfgang Bumiller
  1 sibling, 0 replies; 4+ messages in thread
From: Wolfgang Bumiller @ 2022-06-23  9:46 UTC (permalink / raw)
  To: Mira Limbeck; +Cc: pve-devel

applied, but bumped to 4k, while I think that's *massive*, it'll be even
less likely to be hit, I hope :-)

On Wed, Jun 15, 2022 at 04:09:50PM +0200, Mira Limbeck wrote:
> Azure AD seems to have a variable authorization code size, depending on
> the browser state according to one report in bug #4074 [0].
> 
> Sometimes the size is greater than our current limit of 1024, so
> increase it to 2048.
> 
> The RFC [1] mentions that there is no limit to the code size, but based on
> current experience, a size limit of 2048 might be enough for every
> current OpenID Connect provider.
> 
> [0] https://bugzilla.proxmox.com/show_bug.cgi?id=4074
> [1] https://datatracker.ietf.org/doc/html/rfc6749#section-4.1.2
> 
> Signed-off-by: Mira Limbeck <m.limbeck@proxmox.com>
> ---
> The PBS implementation doesn't seem to be using any code size limit, do
> we want to remove it entirely in PVE as well?
> 
>  src/PVE/API2/OpenId.pm | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/src/PVE/API2/OpenId.pm b/src/PVE/API2/OpenId.pm
> index c838b2c..8653d61 100644
> --- a/src/PVE/API2/OpenId.pm
> +++ b/src/PVE/API2/OpenId.pm
> @@ -134,7 +134,7 @@ __PACKAGE__->register_method ({
>  	    code => {
>  		description => "OpenId authorization code.",
>  		type => 'string',
> -		maxLength => 1024,
> +		maxLength => 2048,
>              },
>  	    'redirect-url' => {
>  		description => "Redirection Url. The client should set this to the used server url (location.origin).",
> -- 
> 2.30.2




^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2022-06-23  9:46 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-06-15 14:09 [pve-devel] [PATCH access-control] fix #4074: increase API OpenID code size limit to 2048 Mira Limbeck
2022-06-17  8:42 ` Wolfgang Bumiller
2022-06-20  9:11   ` Mira Limbeck
2022-06-23  9:46 ` [pve-devel] applied: " Wolfgang Bumiller

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal