18:00:30 #startmeeting OpenStack Security Group 18:00:30 Meeting started Thu Mar 13 18:00:30 2014 UTC and is due to finish in 60 minutes. The chair is bdpayne_. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:32 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:00:34 The meeting name has been set to 'openstack_security_group' 18:00:45 hi everyone 18:00:46 hi all 18:00:49 hi 18:01:22 hello! 18:01:49 #topic Roll Call 18:01:54 anyone else here today? 18:02:39 ok, I'm sure that others will trickle in 18:02:43 #topic Agenda 18:02:51 I'm here 18:02:57 So, I'd like to say a few words about the election 18:03:11 anything else people would like to discuss 18:03:12 ? 18:03:15 I vote that we all abstain, leaving Bryan as the only viable leader. 18:03:24 :) 18:03:37 Bryan probably won't abstain 18:03:55 I cna give an overall OSSN update 18:04:14 * bdpayne_ has already voted 18:04:25 ok, so election and OSSN 18:04:26 anything else? 18:05:20 there's been some interesting discussion around the keystone revocation vs. cache 18:05:37 might be worth some discussion to decide if it's OSSN worthy 18:05:44 the auth_token cache would be an interesting discussion 18:06:01 ok, sounds good 18:06:04 let's get rolling 18:06:05 very interested in the keystone token stuff, do discuss 18:06:11 #topic Election 18:06:11 Hi all ;) 18:06:31 So I've been busy putting together everything for the election 18:06:46 bottom line is that, everyone in the electorate should have received an email with details on how to vote 18:06:56 if you believe you should be allowed to vote, and didn't get an email... let me know 18:07:11 I received an email a few minutes ago 18:07:13 got the email 18:07:16 me too 18:07:17 Also, I sent out an email yesterday with a link to a google doc 18:07:31 that showed who the active members where are how they received that designation 18:08:26 me too 18:08:31 what I found was interesting actually was the IRC meeting participation 18:08:51 I wrote a script that shows how many meetings everyone participated in over the past year 18:09:03 in general, we have a core group of very active people 18:09:07 which is fantastic 18:09:20 anyway... bottom line is... GO VOTE :-) 18:09:25 any questions on the election? 18:09:52 thanks to those who stepped up! 18:09:52 if something comes up, just email me 18:10:02 High Five to bdpayne and hyakuhei for creating this active inclusive community 18:10:11 :-) 18:10:16 #topic OSSN 18:10:24 So what's the latest on the OSSN front? 18:10:47 We got a few published last week, which lowered the queue 18:10:51 I'm very excitied about the gerrit stuff 18:11:16 last I looked, we have 3 open issues and they are all assigned. Someone new to OSSNs stepped up to take on the Cinder one. 18:11:29 there's one embargoed one too 18:11:42 hyakuhei: ok, is it being worked on? 18:12:26 Yes, though if someone has spare cycles for an OSSN we can bring them in 18:12:48 hyakuhei: ok. Would you mind adding me to the issue? 18:12:49 i have some spare cycles this coming week 18:13:08 embargo -- this that a horizon one 18:13:19 I'll have to ok it with the owners but it should be ok. 18:13:24 malini1: nope, something else 18:13:50 For gerrit/git, it looks like I just need to ask infra to create the repo under the docs area. 18:14:24 That's on my list for this week, but Anne said that she's good with the plan to put it under docs. 18:14:35 We're also discussing how to go about getting OSSNs into the security guide 18:14:38 great, so who do you ask - Monty? 18:14:50 into the security guide or just published on the web page. 18:14:57 hyakuhei: I need to track down the right name... 18:15:01 nkinder: The idea was always to thread OSSNs into the guide 18:15:02 there's an #openstack-infra channel 18:15:10 bknudson: we're talking about how to feed them back into the guides 18:15:14 indeed, originally the idea was that the guide would be based on OSSNs 18:15:46 I think we may want to change the form of them, but get the info into the manual if it's a general "here's how you should deploy" sort of thing. 18:16:11 do we need a specific format? the Docbook XML or rst? 18:16:16 For issues that are addressed by new features or bug fixes, they would have a limited lifetime in the manual (whatever release is affected) 18:16:42 bknudson: I was going to ask annegentle about that when we get to it. 18:16:56 So I think at the moment 3-4 are referenced in the guide, they're just footnotes 18:17:00 are we going to "import" existing OSSNs? 18:17:22 bknudson: I think we should look at them. There are only 8, so it shouldn't be bad 18:17:36 Sure - to my mind it's not a big problem to do, can be a quaterly task for the editors of the guide 18:17:41 I know the live migration one I published last week should definitely get into the guide in some form 18:17:50 Thread in a footnote and add the OSSN to an appendix perhaps? 18:18:09 hyakuhei: I think we want to go beyond that in some cases 18:18:27 hyakuhei: for live migration, I think the chapter on compute should talk about it in detail 18:18:42 Absolutely, I'm describing that as a minimum 18:18:47 hyakuhei: +1 18:19:02 The token-cache issue could be another potential one that deserves some inches in the guide. 18:19:18 ...depending on the fix 18:19:25 yes, one more thing before we switch topics to that 18:19:32 hyakuhei: time to create a blog/article for Stefano M for his weekly communique on the history and goals of OSSN/OSSA/OSSG .. this catches a broad audience, often times getting picked up and re-transmitted at companies, and include the kind of data that bdpayne unearthed recently in compiling election list 18:19:47 for the git repo, I've been keeping my personal repo up to date - https://github.com/nkinder/openstack-security-notes 18:20:03 I'm planning on using this as a seed for the official repo 18:20:26 it has all published OSSNs and templates 18:20:37 Good idea. 18:20:43 nkinder: NICE 18:20:50 ok, enough on OSSNs from me 18:21:06 hyakuhei can you continue running the meeting... I just got a phone call that I have to take 18:22:14 #topic Keystone Threat Assessment 18:22:24 I believe this was the other topic of discussion? 18:22:35 no, it was the keystone auth_token cache vs. revocation 18:22:59 oh, sorry 18:23:06 related though I guess 18:23:08 #topic Keystone auth_token cache vs revocation 18:23:16 * bdpayne_ is off the phone 18:23:19 sorry about that guys 18:23:27 So, this issue seems to be a balance issue to me 18:23:27 what's going on with the auth_cache stuff? 18:23:58 Much like PKI revocation checking, the deployer needs to think about what they are willing to live with 18:24:06 So if I recall correctly, this affects both 'traditional' and pki tokens. 18:24:15 I meant PKI in general 18:24:22 not as Keystone uses it 18:24:23 there's separate cache configuration for PKI vs UUID 18:24:42 the PKI path is to check the revoked tokens list 18:25:00 the revoked tokens list is cached. the default for cache timeout was 1 second... it's recently been updated to 300 sec 18:25:31 the UUID path is to check the cache, and if it's not in the cache then validate directly to keystone 18:25:40 so there's a cache for the UUID tokens. 18:26:00 this seems like the same sort of thing as deciding how often CRLs are generated vs. using OCSP with an X.509 setup... a deployment choice 18:26:12 well, ... actually, I think both UUID and PKI tokens use the cache at first. 18:26:17 nkinder, ++ 18:26:32 so the default means that revocation won't be noticed for up to 5 minutes? 18:26:46 in the worst-case yes 18:26:48 ...and if you don't like it, you can make it smaller 18:26:53 #link https://wiki.openstack.org/wiki/Meetings/OpenStackSecurity 18:26:59 oops 18:27:05 #link https://bugs.launchpad.net/python-keystoneclient/+bug/1287301 18:27:28 so the defaults for both the caches are 300 seconds (5 mins) 18:27:37 so if your token was validated, it's good for 5 mins 18:27:41 yes but there are there is no check for cached token 18:27:47 nkinder, perhaps the defaults are a bad assumption 18:27:49 nkinder, but it very clearly feels like a deployment choice 18:27:56 you can delete your token (invalidate it manually), and it'll still work for 5 mins 18:28:08 I guess part of the question is 5 mins a reasonable default. 18:28:17 bknudson, ++ 18:28:27 everyone is going to have their own opinion on what is acceptable. Is it 5 minutes, 30 seconds, immediate? 18:28:45 Deployment dependant. To answer it you need to have a good understanding of how, why, when and how frequently you'll want to kill a token 18:28:47 bknudson, i think 5 minutes is excessively aggressive, but iirc that is what we assume is the closest in-sync we can be due to clock skew? 18:28:53 erm, s/aggressive/lax 18:29:42 So, what are next steps here - one minute left on the meeting 18:30:16 I linked to the bug so if you have opinions you can bring them up there. 18:30:23 is the default stuck as is for Icehouse? If so, we might want to mention in an OSSN 18:30:32 fwiw, I think that this sounds like a good use of an OSSN 18:30:39 deciding if a smaller default is needed is going to be a longer debate I think 18:30:40 and I would get too caught up in what the default is 18:30:44 300 sec seems fine 18:30:52 people will need to tune it regardless 18:30:57 an OSSN makes sense to me. 18:30:58 at least that's my two cents 18:30:59 +1 18:31:21 ok, thanks everyone... nice meeting today 18:31:26 It's the tradeoffs thatneed to be documented, not the literal time 18:31:32 thanks 18:31:38 don't forget to vote :-) 18:31:48 #endmeeting