Project

General

Profile

Actions

Bug #20750

closed

collection sharing tokens shouldn't leak account info of the person sharing (user/currrent)

Added by Peter Amstutz 10 months ago. Updated 9 months ago.

Status:
Resolved
Priority:
Normal
Assigned To:
Category:
Keep
Story points:
3.0
Release relationship:
Auto

Description

Serving files through keep web requires the scopes documented at #20249

However it would be much better if it did not require

"GET /arvados/v1/users/current"

Because that means the sharing link can be used to leak personal information about the person sharing it -- their name, email address, any profile information stored on the user record, etc.

Either the relevant keep-web (or controller) requests should not require users/current, or we should introduce a new API call which returns only the minimum information and use that.

If the primary use of the endpoint is to determine either if the token is valid, or get just the user uuid that is associated with the token, we can already do that with api_client_authorization/current.

Update

The problem is specific to login cluster federation.

api_client_authorization#validate invokes users/current on the login cluster to get the user record.

So it is not just a matter of "just" checking that the token is valid.

Potentially we could rearrange the validation to check the token first, then check if the user record already exists in the local db, then only if the user is unknown or inactive do we try to query for the user record.


Subtasks 1 (0 open1 closed)

Task #20816: Review 20750-sharing-token-scopesResolvedBrett Smith08/24/2023Actions

Related issues

Related to Arvados - Bug #19933: Create working sharing URLs in login federationClosedPeter AmstutzActions
Related to Arvados - Bug #21617: Timeout error reading content from collection on a remote clusterResolvedTom CleggActions
Precedes Arvados - Idea #20927: When validating a remote token, translate transient network errors to a 5xx statusNew08/25/202308/25/2023Actions
Actions

Also available in: Atom PDF