Bug 1823762
| Summary: | Backport SameSite=None cookie from mod_auth_openidc upstream to support latest browsers [rhel-7.9.z] | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Jakub Hrozek <jhrozek> | ||||||
| Component: | mod_auth_openidc | Assignee: | Jakub Hrozek <jhrozek> | ||||||
| Status: | CLOSED ERRATA | QA Contact: | Scott Poore <spoore> | ||||||
| Severity: | urgent | Docs Contact: | |||||||
| Priority: | urgent | ||||||||
| Version: | 7.7 | CC: | aogburn, jreznik, spoore, sssd-qe, tscherf | ||||||
| Target Milestone: | rc | Keywords: | ZStream | ||||||
| Target Release: | --- | ||||||||
| Hardware: | Unspecified | ||||||||
| OS: | Unspecified | ||||||||
| Whiteboard: | sync-to-jira | ||||||||
| Fixed In Version: | mod_auth_openidc-1.8.8-9.el7_9 | Doc Type: | If docs needed, set a value | ||||||
| Doc Text: | Story Points: | --- | |||||||
| Clone Of: | 1823756 | Environment: | |||||||
| Last Closed: | 2020-11-10 13:11:26 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Bug Depends On: | 1823756 | ||||||||
| Bug Blocks: | |||||||||
| Attachments: |
|
||||||||
|
Description
Jakub Hrozek
2020-04-14 12:45:38 UTC
*** Bug 1870325 has been marked as a duplicate of this bug. *** Verified. Version :: mod_auth_openidc-1.8.8-9.el7_9.x86_64 Results :: Basic Regression tests run with no issues found. Settup with SameSite=None enabled: [root@web1 httpd]# cat /etc/httpd/conf.d/example_app_openidc.conf OIDCCryptoPassphrase a-random-secret-used-by-apache-oidc-and-balancer OIDCProviderMetadataURL https://keycloak.kite.test:8443/auth/realms/master/.well-known/openid-configuration OIDCClientID web1.kite.test OIDCClientSecret <scrubbed> OIDCRedirectURI https://web1.kite.test:60443/private/redirect_uri OIDCRemoteUserClaim preferred_username OIDCSSLValidateServer Off OIDCCookieSameSiteNone On <Location /private> AuthType openid-connect Require valid-user </Location> Using Firefox [firefox-68.12.0-1.el7_8.x86_64] on RHEL 7.8: HTTP/1.1 302 Found Date: Mon, 12 Oct 2020 17:17:03 GMT Server: Apache/2.4.6 (Red Hat Enterprise Linux) OpenSSL/1.0.2k-fips Set-Cookie: mod_auth_openidc_state_TSBfAXjjAxZc5xbwf-_5ljhXmKs=;Path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT;Secure;HttpOnly Set-Cookie: mod_auth_openidc_session=1cd6cb27-c5b7-4fce-9215-bd4a5a401f7d;Path=/;Secure;HttpOnly; SameSite=None Location: https://web1.kite.test:60443/private/ Content-Length: 221 Keep-Alive: timeout=5, max=99 Connection: Keep-Alive Content-Type: text/html; charset=iso-8859-1 Using Chrome [google-chrome-stable-85.0.4183.121-1.x86_64] to verify the options set in the cookies: Shows secure checked and SameSite None. Attaching image after this. Default behavior: [root@web1 httpd]# vim /etc/httpd/conf.d/example_app_openidc.conf [root@web1 httpd]# grep -i samesite /etc/httpd/conf.d/example_app_openidc.conf # OIDCCookieSameSiteNone On [root@web1 httpd]# systemctl restart httpd Firefox: HTTP/1.1 302 Found Date: Mon, 12 Oct 2020 17:25:17 GMT Server: Apache/2.4.6 (Red Hat Enterprise Linux) OpenSSL/1.0.2k-fips Set-Cookie: mod_auth_openidc_state_LPc5Bq8kNmi85m5tQLVdd_Lctvs=;Path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT;Secure;HttpOnly Set-Cookie: mod_auth_openidc_session=5526cca8-c28b-494c-b2de-89dd0b7a072f;Path=/;Secure;HttpOnly Location: https://web1.kite.test:60443/private/ Content-Length: 221 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html; charset=iso-8859-1 Chrome: Shows nothing checked and nothing in SameSite field for session cookie. Created attachment 1721012 [details]
chrome session cookie with samesite=none enabled
Created attachment 1721014 [details]
chrome session cookie with samesite=none NOT enabled
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (mod_auth_openidc security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:5035 |