Wednesday, 2022-04-20

*** dviroel|out is now known as dviroel00:20
*** dviroel is now known as dviroel|out00:32
*** dviroel|out is now known as dviroel11:23
gmanndmendiza[m]: knikolla  regarding RBAC policy pop-up meeting. I checked with ricolin about his availability and I was thinking every alternate Tuesday 15 UTC. but you have keystone meeting at same time?13:58
dmendiza[m]gmann: I think knikolla is out this week.  13:59
gmanndmendiza[m]: knikolla other time we can do is 14 UTC Alternate Tuesday, but it will be too early for dansmith  ?13:59
gmanndmendiza[m]: ok, I am thinking to start from next week13:59
gmann26th Tuesday onwards..13:59
dansmith1400 is not too early for me14:00
gmannyeah14:00
dmendiza[m]Hmm...14:00
gmann15 seems best option but it conflict with keystone meeting14:00
dmendiza[m]We could try discussing SRBAC during Keystone meeting?14:00
gmann15 UTC14:00
gmannyeah that is one option14:00
dmendiza[m]not sure if we need a full hour for SRBAC?14:00
gmannwe prefer to discuss in video/voice call for productive14:01
gmanndmendiza[m]: not an hr as such, 30 min or so is ok. 14:01
gmann15:30 - 16 UTC can be good14:02
gmannbut is it ok to switch to voice call ? we can keep keystone meeting open on IRC and capture key points14:02
*** dasm|off is now known as dasm14:03
gmanndansmith: ah sorry, I misread for your line and missed *not too..* :) I think I am half awake :)14:05
dansmithNOT too early... NOT. :)14:05
* dansmith tries bigger font14:05
gmann:)14:05
gmanndansmith: dmendiza[m] ricolin so Tuesday (26th) 14 UTC ok for every one ?14:05
dansmithyeah, I haven't been coming but I guess I need to fix that14:06
dmendiza[m]1430-1500 would work out better for me14:06
dmendiza[m]I have a conflict 1400-1430, and might not be able to get out of it.14:07
gmannok I think we can start with 30 min and if we have more topics to discuss other than current open points then we can see to extend or make it for an hr14:07
gmannI will change this to 14:30 - 15.00 UTC on alternate tuesday starting with 26th https://meetings.opendev.org/#Secure_Default_Policies_Popup-Team_Meeting14:08
gmannthanks 14:08
gmanndansmith: dmendiza[m] ricolin https://review.opendev.org/c/opendev/irc-meetings/+/83872714:18
*** dviroel is now known as dviroel|lunch15:31
dansmithdmendiza[m]: are you aware of any advice against projects writing keystone tokens to their databases and/or logs?15:53
dansmithAFAIK, we generally try to keep them only in the context object which we pass along via RPC and in memory but never store in a lot of cases15:53
dansmithand storing them seems like a Bad Idea(tm) but I'm wondering if there's any actual guidance on this15:54
dmendiza[m]writing token to logs seems risky15:54
dansmithfor sure15:55
dansmithdmendiza[m]: but no guidance specifically that you know of?16:00
dansmithdmendiza[m]: and .. thoughts on the database?16:00
dansmithif there's someone else I should ask, feel free to redirect :)16:01
dmendiza[m]dansmith: I don't know of any guidance off the top of my head.  I'd ask knikolla but he's out this week on PTO16:03
dansmithokay16:03
dmendiza[m]DB doesn't seem too bad (or at least not as bad as putting a token in the logs)16:04
dmendiza[m]since you need DB access credentials to get to it, vs just being able to read the log16:04
dansmithwell, the log presumably requires more permission to read than the db really16:04
dansmithevery machine in the cluster has access to the db over the network, so one compromised machine can read tokens for everyone that has one in the DB, vs just what would have been logged on that machine since rotation ocurred16:05
dansmithreally one compromised service is all it takes actually16:06
dansmithso glance stores admin's tokens in the db to do something, and a compromised service that can read the glance db then has a token that is good for a *lot* of damage to every service and keystone itself, presumably, for $ttl16:07
dmendiza[m]I added this as a topic for the next Keystone meeting to get knikolla's thoughts: https://etherpad.opendev.org/p/keystone-weekly-meeting16:08
dansmithcool, thanks16:08
dansmithI think if there's a clear bit of guidance here (like writing them to logs specifically) it would be good to get that written down somewhere,16:09
dansmithand I'd definitely say some guidance about the DB would be good too16:09
dansmithlike "try not to ever do that, but if you do, there should be some automated cleanup when the token is no longer needed or something"16:09
dansmithor just "don't do that" :)16:10
dansmithI'm surprised we don't have some generic "security practices" document similar to the api guidelines somewhere16:11
*** dviroel|lunch is now known as dviroel16:31
*** ministry is now known as __ministry16:36
*** dasm is now known as dasm|off20:53
*** dviroel is now known as dviroel|out22:27

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!