-
Notifications
You must be signed in to change notification settings - Fork 293
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] The jwt_header
setting breaks compliance with HTTP/1.1 RFC
#3886
Labels
triaged
Issues labeled as 'Triaged' have been reviewed and are deemed actionable.
Comments
3 tasks
willyborankin
pushed a commit
that referenced
this issue
Dec 22, 2023
### Description Add deprecation check for `jwt_header` setting ### Issues Resolved - Related #3886 ### Check List - [ ] ~New functionality includes testing~ - [ ] New functionality has been documented - [X] Commits are signed per the DCO using --signoff By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin). --------- Signed-off-by: Peter Nied <petern@amazon.com>
opensearch-trigger-bot bot
pushed a commit
that referenced
this issue
Dec 22, 2023
### Description Add deprecation check for `jwt_header` setting ### Issues Resolved - Related #3886 ### Check List - [ ] ~New functionality includes testing~ - [ ] New functionality has been documented - [X] Commits are signed per the DCO using --signoff By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin). --------- Signed-off-by: Peter Nied <petern@amazon.com> (cherry picked from commit 3c566a4) Signed-off-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
[Triage] Hi @peternied, thank you for filing this issue. This sounds like a good idea based off of the RFC for HTTP etc. |
prabhask5
pushed a commit
to prabhask5/opensearch-security
that referenced
this issue
Jan 11, 2024
### Description Add deprecation check for `jwt_header` setting ### Issues Resolved - Related opensearch-project#3886 ### Check List - [ ] ~New functionality includes testing~ - [ ] New functionality has been documented - [X] Commits are signed per the DCO using --signoff By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin). --------- Signed-off-by: Peter Nied <petern@amazon.com> Signed-off-by: Prabhas Kurapati <prabhask@berkeley.edu>
dlin2028
pushed a commit
to dlin2028/security
that referenced
this issue
May 1, 2024
### Description Add deprecation check for `jwt_header` setting ### Issues Resolved - Related opensearch-project#3886 ### Check List - [ ] ~New functionality includes testing~ - [ ] New functionality has been documented - [X] Commits are signed per the DCO using --signoff By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin). --------- Signed-off-by: Peter Nied <petern@amazon.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
There is a setting
jwt_header
that allows customizing what header is used to transmit authorization information. Following the HTTP/1.1 RFC [1], theAuthorization
header is reserved for this use. By putting authorization information into a different header name, it could be log incorrectly, poorly handled, or even cause the request to be rejected depending on the client implementation. This feature should not be used.Recommendation
Deprecate use of the
jwt_header
in the current OpenSearch version (v2.X.X) and on the next major version of OpenSearch (v3.0.0) remove it.Additional Context
The text was updated successfully, but these errors were encountered: