17:02:35 #startmeeting openstack security group 17:02:36 Meeting started Thu Oct 9 17:02:35 2014 UTC and is due to finish in 60 minutes. The chair is hyakuhei. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:02:37 hello 17:02:38 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:02:40 The meeting name has been set to 'openstack_security_group' 17:02:48 hi all 17:02:51 Lets have a rollcall :) 17:02:57 o/ 17:03:02 ello 17:03:07 here 17:03:16 o/ 17:04:03 o/ 17:04:20 cool, so lets work out the agenda :) 17:04:51 OSSN, Bandit, Elections, Summit 17:04:53 What else? 17:05:03 that sounds about right 17:05:21 cool 17:05:25 nkinder: OSSNs ? 17:05:28 #topic OSSN 17:05:30 hyakuhei: I have that SecImpact script as well 17:05:45 Thanks Tim, we'll talk that after OSSN 17:05:54 hyakuhei: The main update with OSSNs is that Rob found a number of older ones that were never published on the wiki 17:06:10 #link https://review.openstack.org/#/c/126203 17:06:16 I reformatted them and posted up a review for them, which Rob has been updating 17:06:20 I've done some work to bring them up to current standards 17:06:37 ah, good catch 17:06:38 hyakuhei: your last patch is the first to get blocked by a gate failure too! ;) 17:06:45 woot! 17:06:49 hehe , good work 17:06:50 So our new gate jobs are working 17:06:50 Valid test I think :P 17:06:59 Completely on purpose. 17:07:03 of course hyakuhei was just trying to test the gate tests... :) 17:07:16 +1 I'll buy that :P 17:07:27 lol 17:07:39 So I think there are a few things that need to be adjusted to get those merged, then I'll publish them on the wiki 17:07:46 That's great work nkinder, I'll try to find time to improve them tomorrow 17:07:48 I think there is no need to re-publish them on the mailing list 17:07:56 +1 17:08:03 hyakuhei: If I get a chance this afternoon, I'll update them. 17:08:19 cool, don't worry too much though, I'm happy to do it tomorrow 17:08:26 Anything else OSSN related? 17:08:32 Aside from that, 0025 needs some reviews 17:08:33 https://review.openstack.org/#/c/117928/ 17:08:41 looking 17:08:59 I'll give this latest version a read-through today 17:09:03 * bdpayne plans to do a round of security-doc reviews later today 17:09:20 good plan, it'd be nice to see 0025 done 17:09:32 I saw that one of the other outstanding OSSN bugs was picked up this week 17:09:51 as always, the queue is here... 17:09:52 #link https://bugs.launchpad.net/ossn/ 17:10:09 bdpayne: please let me know if i can help with anything Neutron related 17:10:40 ok 17:10:41 I don't believe LP#1341816 is truly in progress, so I'll switch it back to NEW so it's free for people to pick up 17:11:02 I'll probably grab it myself since it's in an area I'm familiar with 17:11:09 I think tkelsey was going to pick something up - did that happen ? 17:11:32 hyakuhei: not yet sorry, though I will pick up one asap 17:11:32 hyakuhei: yes, I believe so 17:11:40 oh, someone else picked one up then... 17:11:47 yeah wasnt me, sorry 17:11:59 h, Doug picked up https://bugs.launchpad.net/ossn/+bug/1163569 17:12:02 Launchpad bug 1163569 in ossn "security groups don't work with vip and ovs plugin" [High,In progress] 17:12:40 Ah cool, good stuff 17:12:47 Ok, lets talk about Bandit 17:12:50 #topic Bandit 17:13:11 so I added a new test for HTTPSConnection, extracted from OSSN-0033 17:13:12 awesome, I'll work with him on that (I am pushing the code for that) 17:13:13 tkelsey has been added to core, which is cool 17:13:19 apologies for being late. 17:13:27 you're fired rlpple 17:13:34 YEA!!! 17:13:44 :) Anyway - Bandit, what's next guys? 17:13:54 wiki page is at https://wiki.openstack.org/wiki/Security/Projects/Bandit 17:14:06 i'm going to send another update to the mailing list 17:14:27 There's a "other project" suggestion in for Bandit at the summit too 17:14:34 I have started roughing out some ideas here https://etherpad.openstack.org/p/kilo-crossproject-summit-topics 17:14:43 and I think Travis is presenting on it. 17:14:50 we'll keep working on improving the framework, but really it's a case of adding tests, using the tool, and starting to make it more widely known across openstack 17:14:51 well, figuring out gate integration is next I think 17:15:03 hyakuhei: Is Travis going to be attending the summit? 17:15:22 travis's presentation didn't make the cut, iirc 17:15:29 Oh maybe he isn't presenting, maybe he just submitted- lots going on in my head atm 17:15:32 Yeah that's true 17:15:39 Ok well I'l push bandit in my talks anyway :P 17:15:50 +1 :) Bandit is awesome 17:16:15 but that makes the design session even more critical so please take a look at the writeup tkelsey did for a session and edit/improve as required 17:16:51 sounds good .. where is the write-up at, tkelsey? 17:17:19 #link https://etherpad.openstack.org/p/kilo-crossproject-summit-topics 17:17:19 this would be the etherpad linked above? 17:17:20 chair6: some notes here: https://etherpad.openstack.org/p/kilo-crossproject-summit-topics 17:17:41 I wonder if the OSSG gate one should just be merged with Bandit 17:17:52 Yeah probably 17:18:06 discussions about testing SSL in the gate are already under way, so there might not be a lot to hash out there once the summit comes around 17:18:56 that would be a good thing :-) 17:19:06 +1 17:19:11 +1 17:19:19 bdpayne: yes, though there is push back to add SSL enabled devstack as an additional job 17:19:20 Ok anything else re: Bandit? 17:19:35 likely due to the increased test time and slowing the gate 17:19:48 This has already crossed over into Summit talk but I'll tag it anyway 17:19:52 #topic Summit 17:19:53 It might make more sense to switch the current jobs to enable SSL for everything 17:20:05 I think so 17:20:34 if we are only going to test one, perhaps ssl is the better choice 17:20:38 but that's just me 17:20:41 So rcrit has been running through tempest with SSL enabled the last few days to see if there are any issues to be fixed up first 17:20:46 bdpayne: +1 17:20:53 that's what rcrit and I were thinking too 17:21:41 There were a few glance client bugs with SSL that are now being addressed. One merged yesterday, and the other is out for review. 17:22:10 I'm not sure if any other failures have popped up in the tempest testing, but once we have a clean baseline we can push for enabling SSL in the gate 17:22:29 there's been a couple of "Doesnt use certificates properly" bugs in the last few days 17:22:33 mainly cinder 17:22:46 VMT has been downgrading them and I've been pushing back 17:23:28 rcrit should be coming over here to give an update on his SSL testing 17:23:40 oh hai rcrit ! 17:23:51 hiya 17:23:52 this raises another potential summit topic... bug scoring for VMT 17:24:04 rcrit: hey, was just talking about your tempest testing with SSL to prepare for enabling SSL in the gate tests 17:24:15 in fact, perhaps we should have a series of OSSG topics and run our own informal track one day 17:24:23 just find a corner and run with it 17:24:51 bdpayne: yeah, we can ask for a "pod" like the other project teams get 17:25:00 another thing I'd be interested in exploring is ways to provide frameworks for richer input validation across all the projects 17:25:19 rcrit: have you found anything horribly broken in tempest with SSL (other than the glance stuff we know about)? 17:25:23 good ideass 17:25:38 regex is useful, but has it's limitations 17:25:57 well, tempest filled up my disk last night so I haven't yet figured out what passed and what failed 17:26:01 nkinder a pod would be great, if that's an option for us 17:26:20 bdpayne: I'll ask ttx 17:26:33 from a devstack-gate perspective it looks to be fairly easy to configure SSL. The TLS proxy stuff is configured in devstack as an additional service, so I think that if that is added the rest should just work (tm) 17:27:40 I need to understand better how devstack is used in the gate and whether the same VM/install is used for all tests or if a different one is used for each 17:27:50 rcrit: so the question will come up about which SSL scenario the gate should test: native SSL or proxy 17:28:02 if SSL and non-SSL tests are mixed in the same run it could mean using 2 different VMs 17:28:14 I've been assuming proxy 17:28:18 I think proxy is more real-world, but won't catch bugs in the service side SSL implementations 17:28:51 It will. Even in tls proxy mode the services talk to themselves over SSL. There is no clear back channel 17:29:11 proxy will flush out client-side issues in the server code for sure 17:29:29 just not code around listening on SSL/processing SSL requests, right? 17:29:48 that's true 17:30:18 from what I saw, and it's typical in most servers, it's mostly just setup around the socket code. Once the request is received the same code paths are used 17:30:38 ok, so maybe there's very little to fail there. 17:30:41 there is no reason both couldn't be tested 17:30:45 except time and resources 17:30:55 except that it bloats the gate jobs 17:31:02 I think we'll have to choose one 17:31:44 well, proxy +1 for me anyway 17:31:48 anyone else have an opinion on native SSL vs proxy for gate jobs? 17:31:55 rcrit: yeah, I'm leaning towards proxy too 17:32:07 proxy 17:32:22 I suspect that more closely mirrors real world deployments 17:33:59 ok, well we'll see what rcrit finds in his tests and can hopefully propose enabling SSL in the gate soon 17:34:14 Interesting stuff, could probably do with a short summary of what's going on maybe as a blog post or mail to openstack-security some time? 17:34:26 sure 17:34:59 awesome! 17:35:37 Ok so summit wise we are trying to get more time for the OSSG. I like the idea of trying to get a pod / our own space. The midcycle meetup demonstrated how much we can get done in those sorts of setups 17:35:59 Also we should do something social again, probably inviting the VMT too which seemed to work previously 17:37:00 yeah, I like both of those ideas 17:37:04 ok Anything else re: summit? 17:37:08 I know there's lots going on at the summit 17:37:19 Yeah busy time. 17:37:19 but I like the idea of OSSG spending time hanging out together and getting stuff done 17:37:25 +1 17:37:29 +1 17:37:30 we should perhaps come in with a loose agenda / set of goals 17:37:37 Agreed 17:37:44 Etherpad? 17:38:00 sure 17:38:00 #link https://etherpad.openstack.org/p/ossg-juno-summit 17:38:10 lol. kilo maybe. 17:38:19 heh 17:38:41 ...they grow up so quick... 17:38:47 lol 17:39:04 #link https://etherpad.openstack.org/p/ossg-kilo-summit 17:39:41 ok, that should work, care to throw some things into it? 17:40:06 #topic Elections 17:40:29 bdpayne has graciously agreed to officiate once again 17:40:39 https://wiki.openstack.org/wiki/Security/OSSG_Lead_Election_Fall_2014 17:40:55 yeah 17:40:58 Window for candidates closes on the 19th 17:41:00 so what we need now are candidates 17:41:11 right now we have none 17:41:12 bdpayne: I added some content to the "officials" bit 17:41:18 thanks 17:41:30 bdpayne: I'll stand but I don't want to ruin the drama by doing it too early :P 17:41:37 So, if you'd like to be considered for leading OSSG for the next cycle, please put your name forward! 17:42:09 Just a quick email to the list expressing your background and why you want to run would be sufficient 17:42:15 I'll confirm that you are eligable 17:42:23 And I'll add you to the wiki page references above 17:42:45 In the backgroud, I'll be working with Abu on figuring out who is allowed to vote this time around 17:42:56 Yeah, the criteria are listed 17:43:04 So that we can kick off elections later this month 17:43:20 Yeah, the criteria is listed... so it's just a matter of doing the leg work to see who meets those requirements 17:43:23 TBH I think it's highly unlikely we'll get ineligable votes, as being aware of the vote probably puts you in the electorate :) 17:43:35 but process is important 17:43:35 I need to know who to send the ballot to though 17:43:47 Yup 17:43:56 For that we need a list of email addresses... not a mailing list 17:43:59 that's just how the system works 17:44:05 Yeah 17:44:11 #topic Any other business 17:44:19 Anyway... current step is to let us know if you'd like to run 17:44:23 tkelsey: want to talk about that code you were working on today? 17:44:25 And that is all :-) 17:44:28 :) 17:44:32 hyakuhei: sure :) 17:45:05 so hyakuhei asked about making a quick script to check if a member of the OSSG had reviewed a change marked as SecImpact 17:45:20 I have knocked up somthing quick n dirty 17:45:24 tkelsey: ah, cool 17:45:48 groovy 17:45:52 tkelsey: we need to be diligent about adding our -1/+1 then to make sure that it's accurate 17:45:53 question is how best to communicate the results, could turn it into an IRC bot or somthing 17:46:01 is now when we get embarassing graphs? :-) 17:46:05 nkinder: +1 yes for sure 17:46:21 something like "47 DAYS SINCE LAST ACCIDENT" 17:46:28 LOL 17:46:44 tkelsey I'd vote for a monthly summary or something like that 17:46:50 reported here at the meetings 17:46:54 "47 SECURITY ISSUES WAITING TO HAPPEN" maybe 17:46:55 at least as a first step 17:46:58 bdpayne: yes that can work :) 17:47:01 yeah, weekly is probably good 17:47:04 it would be nice to be able to track how well we are doing with that 17:47:07 ITs a good start, hopefully we'll end up with a nice way of driving more contributions :) 17:47:10 and this data will be valuable 17:47:29 I think the inverse is really useful (knowing how many we are dropping) 17:47:33 we could always have a silly award for the highest contributors 17:47:39 awarded at each summit 17:47:47 Yeah why not :) 17:47:55 Better check tkelsey's input though 17:47:55 +1 17:48:17 how ever we want to use the data is going to be better than nothing :) so it all sounds good to me 17:48:30 like hyakuhei buys the top contributor a $100 bottle of scotch 17:48:31 I can get us the data in what ever way is seen as being best 17:48:46 +1 for scotch! 17:48:48 :-P 17:49:29 bdpayne: It must be Nebula's turn to by the whisky by now? 17:49:31 +2 17:49:46 heh, perhaps 17:49:53 Cool. Any other business guys? 17:50:03 not from this end 17:50:21 nothing here 17:50:32 so we dont have much marked with SecImpact it seems https://review.openstack.org/query?q=message:SecImpact 17:50:46 SecurityImpact ? 17:51:01 yeah, I have configured the script to search on a bunch of tags 17:51:09 Good plan 17:51:25 SecurityImpact seems to result in at least some amount of input 17:51:28 Yeah SecurityImpact turns up plenty :) 17:52:40 Awesome 17:52:46 Right, anything more to add guys? 17:53:20 nothing from me 17:53:42 ok that's a wrap! Thank you everyone! 17:53:47 thanks! 17:53:52 thanks :-) 17:53:53 thanks all 17:53:53 thank you 17:53:58 #endmeeting