17:02:32 #startmeeting openstack security group 17:02:34 Meeting started Thu Mar 5 17:02:32 2015 UTC and is due to finish in 60 minutes. The chair is hyakuhei. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:02:35 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:02:37 The meeting name has been set to 'openstack_security_group' 17:02:40 Hi All! 17:02:48 hello! 17:02:51 ohai! 17:03:07 Hola! 17:03:18 hey 17:03:21 hi 17:03:32 greetings 17:03:44 salutations 17:03:49 hi all 17:03:54 nkinder: you’re alive! 17:04:12 nkinder: welcome back 17:04:43 howdy 17:04:50 Looks like a good crowd 17:05:03 Agenda items: 17:05:03 hyakuhei, tmcpeak: thanks! 17:05:08 Summit 17:05:09 OSSN 17:05:13 Anchor 17:05:18 finally don't have a meeting conflict 17:05:19 Bandit 17:05:32 * bdpayne arrives in the nick of time 17:05:39 Thank god! 17:06:29 Any more agenda items? 17:06:46 Maybe we should put ‘agenda’ on the agenda :) 17:06:55 SSL gate 17:06:59 We should consider using the wiki for it like Barbican, Keystone and others. 17:07:01 or TLS gate... 17:07:04 Excellent 17:07:12 ok lets start then lots to go through 17:07:18 #topic summit 17:07:51 There’s a lot of great security content this year, running all week! It might make it hard to organise an OSSG meetup that everyone can attend 17:08:14 o/ 17:08:35 have they announced the accepted talks yet? 17:08:39 No 17:08:39 yeah, a meetup always seems difficult 17:08:46 Track chairs are busy shaping things 17:09:08 Which this year includes myself and bdpayne 17:09:22 congrats guys :) 17:09:30 how many slots? 17:09:46 15! 17:09:48 ~15 17:09:51 wow 17:10:02 I know, my constant bitching must be wearing them down 17:10:13 hehe, very nice 17:10:15 We’ve come a long way from hong kong that’s for sure 17:10:30 and I think there are around 60 submissions 17:10:40 so we should be able to put together a nice security track 17:10:48 cool 17:10:50 ok so yes, I’ll be trying to get us some proper space for the OSSG, design summit time for bandit and anchor too if possible 17:10:59 Yeah it’s going to be great, I’m really excited about it 17:11:07 that would be awesome 17:11:18 ok lets roll onto the next item, OSSN 17:11:21 #topic OSSN 17:11:23 how feasible is it more me to teleconference in some way for bandit design summit? 17:11:32 tmcpeak: pretty difficult... 17:11:42 yeah design summits are hectic 17:11:42 ahh ok, you guys can hold it down :) 17:11:49 If you’re not there best to act as a remote reviewr 17:11:57 possibly or something similar 17:11:59 anyway - OSSN 17:12:04 nkinder: fancy giving an overview? 17:12:10 Sure 17:12:11 I see a few in the queue recently 17:12:27 There have beena few published recently, and the queue has about 7-8 IIRC 17:12:51 A few are pretty old... 17:13:18 Some are assigned and marke "in progress" 17:13:22 Is it worth having a push on the old ones? 17:13:28 I'd like to see if they need to be free'd up for others to take 17:13:29 tmcpeak: loves writing OSSNs … :D 17:13:33 so, https://bugs.launchpad.net/ossn/+bug/1163569 17:13:34 Launchpad bug 1163569 in OpenStack Security Notes "security groups don't work with vip and ovs plugin" [High,In progress] - Assigned to Steven Weston (steve.weston) 17:13:40 lol, he does? 17:13:43 nkinder: +1 17:13:54 Yeah didn’t that go through a round of review then stall out completely? 17:14:06 Was doug’s originally too I think 17:14:30 hyakuhei: I don't see a submitted OSSN review in the LP 17:14:44 Maybe I’m confusing it with another one, I’ll check my backlog 17:14:44 The cinder bug says Fix Released for this as well 17:15:43 Cinder has a fix for an OVS/vip issue? 17:15:53 yeah, I'm confused 17:16:03 well, the LP says fixed at least. Not sure if it's really a fix. 17:16:10 sorry, mixing up links 17:16:12 nkinder: you sure we're talking about the same? 17:16:16 so sweston isn’t here I’m guessing ? 17:16:30 https://bugs.launchpad.net/ossn/+bug/1329214 is the other stalled cinder one 17:16:31 Launchpad bug 1329214 in OpenStack Security Notes "tgtadm iscsi chap does not work" [Undecided,In progress] - Assigned to Steven Weston (steve.weston) 17:16:46 pinged him in #openstack-security 17:16:57 here now 17:17:11 "if you ping I will be there" 17:17:32 :D 17:17:33 hehe, yes not sure what do do with this one 17:17:39 sweston: hey, we were wondering about the status of a couple of your OSSN bugs 17:17:54 https://bugs.launchpad.net/ossn/+bug/1329214 17:17:55 Launchpad bug 1329214 in OpenStack Security Notes "tgtadm iscsi chap does not work" [Undecided,In progress] - Assigned to Steven Weston (steve.weston) 17:18:04 https://bugs.launchpad.net/ossn/+bug/1163569 17:18:05 Launchpad bug 1163569 in OpenStack Security Notes "security groups don't work with vip and ovs plugin" [High,In progress] - Assigned to Steven Weston (steve.weston) 17:18:09 nkinder: yes, I need to close these out 17:18:33 sweston: are you blocked on anything, or is it just getting time? 17:19:24 on the first one, need to complete verification. but yes, mostly time 17:20:01 I will put a few hours into these bugs tomorrow, and ping with any questions 17:20:05 ok, understandable :) 17:20:22 I'm guilty myself with https://bugs.launchpad.net/ossn/+bug/1390124 17:20:24 Launchpad bug 1390124 in OpenStack Security Notes "No validation between client's IdP and Keystone IdP" [Undecided,In progress] - Assigned to Nathan Kinder (nkinder) 17:20:37 I'll work on getting a draft before next week's meeting 17:20:45 ok :-) yay, I'm not the only one, hehe 17:20:48 That’d be great! 17:21:01 There are 4 others up for grabs here - https://bugs.launchpad.net/ossn/ 17:21:12 Are there any more ‘entry-level’ OSSNs that might stand out for newer members to have a try at? 17:21:23 some look pretty easy at first glance 17:21:43 I'd say this one? https://bugs.launchpad.net/ossn/+bug/1401170 17:21:44 Launchpad bug 1401170 in Glance "0-size images allow unprivileged user to deplete glance resources" [Undecided,In progress] - Assigned to Stuart McLaren (stuart-mclaren) 17:21:47 the pecan one for example 17:22:13 Yeah the pecan one looks good 17:22:17 I’ve grabbed one too 17:22:22 OSSNs are a great way to achieve fame and glory! (...or so I'm told) 17:22:43 All the glory! 17:22:46 the first one I wrote came up in an internal company discussion yesterday :D 17:22:54 Awesome, thanks for the summary nkinder 17:23:06 do you get ATC for an OSSN? 17:23:07 Any more to discuss on OSSN ? 17:23:11 bknudson: yes. 17:23:17 that's 600 bucks. 17:23:25 Heh true 17:23:51 Yep! 17:24:05 cool 17:24:07 Nothing else on OSSNs 17:24:11 #topic Anchor 17:24:43 Just a quick heads up, we’ve done a bunch more work on this recently, lots of refactoring and introduction of sanity :) we’re looking for reviews/contributors 17:25:30 cool! 17:25:34 can you provide a quick overview of the recent work? 17:26:00 Sure 17:26:17 So Doug landed a patch that moved us over to JSON configs as you know from all your help bdpayne 17:26:28 :-) 17:26:44 That kind-of broke functionality a bit, tkelsey has a patch in flight to fix that, a combination of mine and dougs work as well as his 17:26:45 hyakuhei: can you also provide a very brief description of Anchor so potentially new contributors (read: me) can gauge interest? 17:26:54 We’ve added a bunch of unit tests 17:26:56 heh yeah 17:26:58 I looked it up, but it's a wall of text :) 17:27:04 im actually adding functional test right now 17:27:08 Sorry, sure fletcher_ 17:27:40 Anchor is an Ehpemeral PKI platform. It provides some easy ways to do PKI and in some configurations can provide you with strong assurance 17:27:51 Ah ok, yah, that's right 17:27:58 :) 17:27:59 we talked about it at the meetup 17:28:04 Yeah 17:28:32 So lots of unit tests (more to come) but going in the right direction :) 17:29:05 #topic Bandit 17:29:14 tmcpeak et al 17:29:16 there has been a flurry of development work on Bandit 17:29:16 I'm intersted in helping, although I don't have any experience with that sort of thing. anyways, sorry for the interruption 17:29:30 hyakuhei ^ 17:29:47 notably check-ins from David Wyde, fletcher, belch 17:29:56 fletcher_: awesome :) 17:29:56 ljfisher 17:30:03 browne 17:30:05 chair6 17:30:16 I think I'm missing one 17:30:26 anyway tons of great check-ins 17:30:28 keep them coming! 17:30:30 :D 17:30:44 the other thing that happened this week was I attended the Keystone meeting to intro Bandit 17:30:50 it's worth mentioning that the change I pushed was a pretty considerable one. When you guys run it against stuff, keep an eye out for any oddities and file bugs 17:30:51 bknudson set that up 17:30:53 fwiw, the changes we've made have gone a long way in the CI efforts here, so I really appreciate everyone's help reviewing and commiting things! 17:31:11 yeah, I'm amazed with the participation level in Bandit now 17:31:26 have tons of great devs doing great things, I spend at least an hour a day now on just reviews 17:31:28 which is awesome 17:31:44 we'll be publizing bandit via technical blog posts too 17:31:53 fletcher_: oooh ++ 17:31:53 I think we got good support from the rest of the keystone team to get bandit running on keystone code. 17:32:05 bknudson: can you give an overview of the Bandit keystone intro please? 17:32:07 so, no pushback there. 17:32:11 i’m impressed with the good reception 17:32:17 I have some plans for next-steps with regards to the contextual awareness, which may lead to first-steps in flow analysis, but that's a bit down the road 17:32:30 they had some concerns about whether bandit was going to expose potential security vulnerabilities 17:32:47 lol wut, that's the whole purpose right? 17:32:49 they didn't want it to? :) 17:33:11 well, they don't want it to be the first thing exposing an existing horrible bug. 17:33:23 this is a good point 17:33:37 Is bandit being run in a public forum? 17:33:40 I spoke to ljfisher about it, we're thinking we should implement something to scan OpenStack projects when we implement a new test 17:33:44 manually running it should help with that then 17:33:48 to make sure we aren't dropping 0 days or something 17:33:48 yes, the results will be totally public. 17:33:50 fletcher_: yes, CI results are public 17:33:59 well, if it's exposing them, then obviously they have failed to find them thus far... 17:34:01 ...but anyone can just run it and find issues themselves too 17:34:08 bknudson: But in the gate it’ll be checking new code 17:34:10 nkinder: yeah, that's pretty much the stand I took 17:34:17 So finding a 0day before it’s merged should be ok right :) 17:34:19 I get their point though. Just run it privately first to see what it reports 17:34:21 what hyakuhei said 17:34:24 we should at least think about what to do before adding new tests in Bandit if they expose serious bugs 17:34:30 sticking their heads in the sand doesn't protect them from 0day lol 17:34:30 yeah, I can see both sides 17:34:33 Once it's in CI with a clean baseline, it will keep new issues out of committed code 17:34:38 yeah 17:34:50 I also made a sensible profile for Keystone to use 17:34:54 we are on a touchy line 17:34:58 that includes our solid tests, but removes some of the noisy ones 17:35:00 You’re going to want to go through a round of quickfixes to make it play nice in the gate anyway I think 17:35:12 This is very exciting 17:35:17 yeah, we're very close 17:35:24 We should also put Bandit in the Anchor gate :) 17:35:24 and they are excited to use it 17:35:31 hyakuhei: +1 17:35:33 that would be awesome 17:35:40 so we need it in pypi 17:35:41 we should put Bandit in the bandit gate too 17:35:54 I've talked with the creator of PyPi about it 17:35:54 bknudson: yeah, I was just waiting for flurry to die down 17:35:54 yes :) 17:35:55 he seems open 17:35:57 then I can update my keystone job 17:35:59 Are they likely to add Bandit (with a stronger set of profiles) to the Keystone run_tests scripts that devs can run locally? 17:36:13 then I or someone can update infra to run it. 17:36:26 hyakuhei: we didn't discuss that 17:36:26 then we can all party. 17:36:29 oh, you mean Bandit in PyPi. I meant running bandit on all things in PyPi 17:36:40 fletcher_: lol, that would be… interesting 17:36:50 fletcher_: I like your ambition :D 17:36:54 lol 17:37:10 finally, ljfisher and I moved our TODO section from wiki to proper launchpad blueprints 17:37:28 Any more on Bandit ? 17:37:30 and did a little bug pruning 17:37:33 nope, should be good 17:37:39 it may be worth considering grouping tests some way, so it's possible to select test-sets 17:37:54 ukbelch: sure, let's synch after 17:38:27 Great 17:38:38 nkinder: want to talk about the TLS gate you mentioned ? 17:38:42 #topic TLS Gate 17:38:42 SUre 17:39:07 A lot of groundwork has been laid by rcrit for making TLS gate tests possible 17:39:24 He's been able to run the entire set of gate jobs with TLS enabled for all services 17:39:29 ...all passing 17:39:35 Wow thats great! 17:39:39 devstack? 17:39:47 Patches for everything are in aside from just proposing the gate job 17:39:49 bknudson: yes 17:40:04 what do you mean TLS gate tests? 17:40:30 tmcpeak: Enabling TLS for all openstack services (as deployed by devstack), then running the full gate suite that exists today 17:40:37 Today, TLS isn't enabled for anything 17:40:38 wow 17:40:41 TLS-only 17:40:45 I've tested with the smoke tests so far 17:40:49 right? 17:40:50 ...and devs constantly break TLS 17:40:54 that's awesome 17:41:11 yea, very cool 17:41:26 bknudson: yes, no http AFAIK (rcrit can confirm) 17:41:26 I’d like to know more about the tests 17:41:43 is there a way we could run the TLS grading tests, like what qualsys put up, on this 17:41:43 it just runs tempest against a set of secure servers 17:41:49 hyakuhei: the tests aren't anything specific to security / TLS 17:41:54 So these aren’t tests of the efficacy of the TLS configuration etc just that secure tunnels are working ? 17:42:02 bknudson: figures 17:42:15 can add them once the TLS gate is up. 17:42:20 correct 17:42:32 right, at this point it is a constant battle just to keep TLS working with the major services 17:42:43 hyakuhei: we keep finding things where people hard-code "http" for example 17:42:50 if working TLS becomes part of the gate job then it will be up to the submitter to not break things 17:42:51 ...or they break the CA validation 17:42:52 not sure what that kind of test would get you though... nobody deploys with devstack, right? 17:43:15 no but it will ensure that the underlying code is sound in at least some configuration 17:43:44 Excellent work! Thanks for the effort rcrit! 17:43:50 oh, I'm fine with the functional testing... I'm just not sure what you would get from a test for which ciphers are supported or whatever. 17:43:58 bknudson: agreed 17:44:14 So not using obviously bad things by default might be good 17:44:19 this just keep people from totally breaking TLS 17:44:30 Bandit will check all that soon enough though :) 17:44:58 so a test where the cert is bad so client ops fail would be good. 17:45:06 :) 17:45:08 Yup 17:45:09 So what's left is ensuring nobody has introduced new bugs against TLS since the last run (they probably have), then proposing the changes to enable the gate job 17:45:20 Like verify=false 17:45:28 which would likely make gate testing easier :P 17:45:33 I'd like to get some traction behind the review to enable the gate job once it's proposed 17:45:40 I'm looking forward to the gate test, so great work. 17:45:48 link? 17:45:51 A lot of people may not really care about TLS in the gate, but it's safe to say everyone here does 17:45:59 +1 17:46:02 ++ 17:46:27 bknudson: not proposed yet. rcrit wants to run tempest to see if things have been broken again first. 17:46:39 Sensible! 17:46:46 add me to the reviews if you want. this will help our group, so happy to review. 17:46:57 bknudson: great 17:47:04 and I need to write a new profile for the devstack-gate project to run the suite. That is where the patch will land. 17:47:59 anyway, this has been a long march and I wanted to let everyone know it's close to completion 17:48:32 might be good to publicise this... 17:48:37 e.g., the ops mailing list or -dev. 17:48:46 you might get more support from operators. 17:48:51 Makes sense 17:49:02 yeah 17:49:13 Actually kind of brings us onto one more item 17:49:22 hyakuhei: dev practice? 17:49:22 #topic mailing list 17:50:15 The time has come to kick the openstack-security mailing list over to ReadOnly, it’ll be used for security impact notifications etc but normal ML conversation should go via -dev using the [ossg] tag 17:50:47 +1 17:50:49 Over time we haven’t used -security enough to warrant having it and working on -dev will raise our visibility 17:51:26 +1 17:51:56 Great so I’ll send an email out regarding that soon and we’ll just migrate over :) 17:52:30 #topic Any other business 17:52:49 I’m working still on getting OSSG recognised as a proper part of OpenStack 17:52:53 development practices 17:53:13 what's our path to move forward with them? 17:53:24 There’s some discussions around naming and tents of various sizes… I hope to have more for you all soon 17:53:46 tmcpeak: It’s kinda of waiting on the inclusion work 17:53:51 what's that? 17:53:57 because that will affect how/where it gets published 17:54:04 oh 17:54:05 inclusion of OSSG into OpenStack proper 17:54:18 ok, I just want to make sure they don't get dropped 17:54:37 we all did a good amount of work on them 17:55:05 Yeah they’re still there :) Doug tweaked a bunch of them recently 17:55:08 can we move them somewhere semi-permanent? and start promoting them? 17:55:17 Not yet 17:55:40 okies, I'll keep bringing this up every week until we can :D 17:55:54 #link https://github.com/openstack-security/Developer-Guidance 17:55:58 For those that care 17:56:34 They could also be integrated into the sec guide - an 'openstack developer security best practices' section? 17:56:51 sicarie: seems like a different target audience 17:56:55 Format might not be great, they’re supposed to be more conversational 17:57:05 They could certainly be referenced somewhere in there though 17:57:08 yeah, could still use some tone editing 17:57:20 nkinder - definitely a slightly different gear 17:57:24 tone is suppose to be informal and developer to developer 17:57:40 They certainly need some work to use a ‘single voice' 17:57:46 yeah 17:57:57 cool any last minute items chaps? 17:57:58 yeah, I don't think that the developer guidance is a good fit for the security guide 17:58:01 voice should match https://github.com/openstack-security/Developer-Guidance/blob/master/shell_injection.md 17:58:19 good meeting all :) 17:58:54 Yeah thanks everyone! 17:59:09 Thanks! 17:59:20 #endmeeting