18:00:41 #startmeeting OpenStack Security Group 18:00:42 Meeting started Thu Nov 21 18:00:41 2013 UTC and is due to finish in 60 minutes. The chair is bdpayne. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:43 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:00:45 The meeting name has been set to 'openstack_security_group' 18:00:52 good morning / afternoon / evening everyone 18:01:17 hi 18:01:18 good morning! 18:01:31 any others here for the OSSG meeting? 18:01:41 hi 18:01:48 me here 18:02:07 hi 18:02:57 ok, let's get started 18:03:10 last week we did some post summit wrapup 18:03:22 and I suggested a lot of ways for people to get involved 18:03:33 this week, I'm happy to report that several people have stepped up to help out 18:04:03 nkinder will be our community manager 18:04:07 welcome nkinder 18:04:13 thanks! 18:04:16 first order business - congratulations to nkinder! 18:04:42 we also have some momentum on the OSSNs with people volunteering to help and/or edit them 18:04:47 nkinder: what does community manager do? 18:05:03 bknudson: that's a good question that I'm trying to figure out. :) 18:05:09 ha 18:05:14 here 18:05:25 I think a big part is coordination with the projects around security 18:05:27 here's the simple description I put together "As the Community Manager, Nathan will take the lead on ensuring that the work happening in OSSG is known by others in the community. And he'll help us focus our involvement in conferences and other such events." 18:05:43 ok, that sounds great 18:06:07 clearly nkinder will need to get up to speed on all things OSSG 18:06:15 I'm looking at doing more than just organizing communication as well. Helping to improve our processes and expand what we do. 18:06:21 yeah, there's a lot to learn. 18:06:26 but please feel free to pick his brain, and leverage him as a resource for communicating what we do 18:07:13 I have also heard from someone ineterested in being an editor for the book... so hopefully that comes together 18:07:18 more details soonish on that, hopefully 18:07:49 that's great - bryan - what does it require to be the editor for the book? 18:08:09 good writing skills 18:08:10 :-) 18:08:12 :) 18:08:21 well, that and some knowledge of the domain 18:08:27 no, does it need any company affiiliation/ partime / full time etc 18:08:28 ? 18:08:42 oh, certainly not anything like that 18:09:06 in my email yesterday, I just reached out looking for some book editors to help cleanup the book and make it a more polished read 18:09:17 so we'll take what we can get :) 18:09:17 sriramhere you want to help? :-) 18:09:25 Yes Bryan 18:09:39 excellent, I'll be in touch about that 18:09:46 i missed that email, but would like to help. 18:09:47 thanks 18:10:05 so, with that length intro 18:10:14 anything that people want to discuss today? 18:10:30 got update and a followup question 18:10:38 OSSN/OSSA publishing is a topic I'd like to discuss 18:10:53 update : following nkinder, me working on https://bugs.launchpad.net/ossn/+bug/1227575 OSSN 18:10:55 ok 18:10:55 Launchpad bug 1227575 in nova "DoS style attack on noVNC server can lead to service interruption or disruption" [High,In progress] 18:10:56 if no other topics -- are you guys familiar with nist / fips standards ? 18:11:20 nkinder - u go first. didnt mean to interrupt the OSSN updates 18:11:22 bknudson we can discuss that a bit at the end 18:11:30 bdpayne: thanks 18:11:31 #topic OSSN updates 18:11:43 Ok, so I have one OSSN that is ready for publishing 18:12:02 being that it's my first OSSN, I'm not sure what lists we usually send them to. 18:12:27 I think that they have gone to just openstack@lists.openstack.org in the past 18:12:39 ok, just the main user list? 18:12:44 yeah 18:12:51 but... wide coverage may make sense 18:12:53 and -announce? 18:12:58 alright, I'll send that out today. 18:13:12 in the past, not -announce 18:13:13 perhaps.... that brings me to the larger topic I want to discuss 18:13:24 but, yeah... I know where nkinder is headed... so go ahead 18:13:41 It seems like the notices can get missed easily with just sending them out to the main mailing list. 18:14:04 I think we might want a separate list just for advisories, and putting them up on a wiki/webpage would be great too. 18:14:30 That starts to get into the format of the advisories/notes too. 18:14:31 Can we work with Stef on surfacting this up to COmmunity Newsletter? 18:14:51 we talked about a 'Security Corner' in the newsletter 18:14:53 what about the dev list too? 18:15:02 the newsletter would be good. 18:15:13 Links to the wiki/ webpage can go in that 'Security Corner' updates 18:15:17 I think that posting to dev and the main list is typically discouraged 18:15:30 The more broadly distributed the better I think, but there should be a way to easily be notified without a lot of other noise. 18:15:33 I think that something like this is perhaps best placed on a webpage / wiki 18:15:46 blog 18:15:46 with a feed, perhaps 18:15:53 I'd like to get things into a structured format, like CVRF. 18:15:59 and then we could announce that we are doing that via the newsletter, for example 18:16:33 i like the idea of adding to a blog/ wiki and surfacing up to newsletter 18:16:56 I'm starting to investigate that. If we have the advisories in CVRF format, we can then generate other formats for wiki/e-mail/newsletter too. 18:17:24 nkinder that sounds reasonable 18:17:32 should certainly coordiate with VMT people on this 18:17:37 Definitely 18:17:41 gr8 18:17:43 would be nice to have a parallel publishing setup for OSSAs 18:17:59 I'm doing some initial investigation, but planned to write something up to discuss with VMT 18:18:02 but for now, just a post to the mailing list is a good start 18:18:06 yep 18:18:37 ok, I'm good on that topic. 18:18:58 thanks 18:19:00 ok, i want to followup on threa model 18:19:10 #topic threat model 18:19:17 take it away sriramhere 18:19:39 thanks to Shohel, we have the wiki up 18:20:00 He put in to touch with couple others from his team who can coordiante while he is away 18:20:27 i want to know who else is interested, so we can have a quick chat on next steps 18:20:46 link to wiki? 18:21:19 for those that aren't aware, this is about work that is aiming to do some threat modeling on some of the key integrated projects for OpenStack (like Keystone, Nova, Swift, etc) 18:21:32 https://wiki.openstack.org/wiki/Security/Threat_Analysis 18:21:52 thanks Bryan. you beat me :) 18:21:52 I saw that there was an analysis of Keystone a few releases back. 18:22:03 sriramhere any more details on the approach or what kind of expertise are needed for this project? 18:22:06 is the output updated books or bugs? 18:22:30 prior exp. with threat modeling preferred 18:22:32 output here will be bugs... and hopefully some lessons learned to improve the dev process more broadly 18:22:45 even if not, let us get started with interested people 18:23:05 bknudson is this a space you are interested in? 18:23:24 I wish I had the time... 18:23:30 we'll be interested in the results 18:23:33 ha, I know that feeling 18:23:38 indeed 18:23:41 :) 18:23:43 and of course if there's questions about keystone I should be able to answer 18:23:52 great 18:24:03 sriramhere anything else on this topic? 18:24:13 keystone definitely has a large surface area by itself. 18:24:49 looks like no one in the meeting now has bandwidth to join. so done with the topic 18:24:54 ok, let's move on to our final topic 18:25:00 #topic fips / nist stuff 18:25:08 bknudson you had questions here? 18:25:11 people around here ask about this stuff. 18:25:25 and I was wondering if there was any community effort in this area that you knew of. 18:25:32 e.g., https://wiki.openstack.org/wiki/Meetings/OpenStackSecurity 18:25:34 oops 18:25:36 http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf 18:25:49 related to key lengths. 18:25:54 ahh 18:26:01 EC keys? 18:26:05 so the short answer is no 18:26:13 this is one area that we haven't hit as much 18:26:20 the book does have a chapter on compliance 18:26:25 but this is a touch different 18:26:38 yes, I was just reading through the security book and hadn't gotten to that yet. 18:26:57 I, for one, think it would be a nice contribution to have someone pull together the relavent docs and put together some best practices there 18:27:19 alright, well if I find out stuff related to this I'll keep the security group informed. 18:27:41 one of the challenges is in just general key management / key rotation / key expiration / etc... and Cloudkeep / Barbican aims to improve this quite a bit 18:28:13 but there's other challenges around understanding where an OpenStack deployment uses keys and how they should each be handled, for example 18:28:17 That seems to be the difficulty now. Who is responsible for keys in general? 18:28:19 this came up on the mailing list recently 18:28:44 Jeffrey Walton asked the question, I believe 18:28:59 there's key handling stuff in keystone, in barbican ... obviously nova has some access keys... 18:29:11 but the answer to "who is repsonsible for keys" is basically the cloud implementor today... with help from Barbican in the future 18:29:27 I think that we should work to get all of that in one place 18:29:29 are we proposing a key manager 18:29:36 and I do think that Barbican is the right place 18:29:41 There is a proposed KM interface 18:29:41 Barbican is a key manager 18:29:59 I think we should work to standarize that and eventually push that into oslo 18:30:12 #topic End NOtes 18:30:17 Then Barbican or whatever else KM would work 18:30:31 Just a note that we won't meet next week b/c of US Thanksgiving holiday 18:30:37 and with that, we are out of time 18:30:44 thanks! 18:30:48 happy to continue the key manager stuff on the ML 18:30:52 thanks, happt thanksgiving! 18:30:57 thanks everyone 18:31:01 #endmeeting