17:00:34 #startmeeting security 17:00:35 Meeting started Thu Sep 24 17:00:34 2015 UTC and is due to finish in 60 minutes. The chair is elmiko. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:36 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:38 The meeting name has been set to 'security' 17:00:44 xarses: closing? let's move to #fuel-dev for 5 more min.. 17:00:44 o/ 17:00:47 hi 17:00:53 hey elmiko 17:01:07 o/ 17:01:13 o/ 17:01:35 o/ 17:02:05 ok, let me dig up the agenda rob sent out. 1sec 17:02:30 #char tkelsey nkinder 17:02:37 #chair tkelsey nkinder 17:02:37 heh :) 17:02:38 Current chairs: elmiko nkinder tkelsey 17:02:41 just in case 17:03:08 ok, lets get this rolling =) 17:03:26 I'm feeling charred... 17:03:32 #topic PTL shenanigans 17:03:32 lol 17:03:33 lol 17:03:37 #link https://review.openstack.org/#/c/224798/ 17:03:55 anyone have additional thoughts on this? 17:04:01 seems like everything went through ok 17:04:03 #link http://lists.openstack.org/pipermail/openstack-dev/2015-September/075275.html agenda 17:04:28 seems good to me, so Rob is officially setup 17:04:28 other than a fantastic opportunity to troll Rob, I have no feelings 17:04:30 thanks tkelsey 17:04:36 haha, nice dg_ 17:04:38 haha 17:04:39 yeah, seems like it's all set 17:04:50 ok then 17:04:58 #topic VMT project tracking 17:05:05 #link https://review.openstack.org/#/c/226869/ 17:06:00 gmurphy, tristanC , you guys have anything to add on this one? 17:06:04 please review. part of the implication to the security group is potentially being roped in for 'audits' of code bases before they are allowed to reach 'vulnerability managed' status 17:06:24 yea, the audit part was the only thing that really stood out to me 17:06:26 gmurphy: interesting 17:07:10 basically we don't want to accept a project.. then run bandit and have hundreds of tmp file vulnerabilities or similar 17:07:29 yeah, makes sense 17:07:30 yea, that makes good sense 17:07:34 jinx! 17:07:40 heh :) 17:07:53 maybe a standardised bandit config could be a good thing 17:08:01 as a base level it must pass cleanly ? 17:08:13 just thinking out loud 17:08:15 yeah sounds like something to work towards 17:08:18 the real question would be, what plugins to have on that standard? 17:08:34 sure, we would have to come up with a list 17:08:39 maybe nut it out over a review? 17:08:44 +1 17:08:45 probably take a few rounds of revision and input 17:08:52 +1 17:08:52 +1 17:09:03 have the security team review the #nosec as well? 17:09:15 so they don't just add those everywhere :) 17:09:27 good point! 17:09:39 edmondsw: sounds good 17:09:49 o/ 17:09:55 doesn't bandit have a flag now to ignore or show the nosec tags for such purposes? 17:10:01 or am i making stuff up? 17:10:16 it would be handy to have an option that required a comment in addition to #nosec. 17:10:17 gmurphy: not that i know of, but it probably should 17:10:40 yeah, I don't think I've seen that feature yet 17:10:55 bknudson: +1 17:10:55 ok. i must be dreaming.. 17:11:04 kevinlondon: glad you could make the meeting, thanks for that email earlier 17:11:13 thanks! no problem :) 17:11:14 gmurphy: I'll add a bug to create it :) 17:11:32 Sounds like a nice feature to have 17:12:12 I volunteer as tribute to have Barbican go through the new VMT tag process. 17:12:12 cool. 17:12:23 nice 17:12:27 haha 17:12:57 is there an action we can associate with this? 17:13:12 #link https://bugs.launchpad.net/bandit/+bug/1499467 17:13:12 Launchpad bug 1499467 in Bandit "Bandit needs an override for #nosec" [Wishlist,New] 17:13:21 maybe define what a 'security group code audit' means? 17:13:47 ok, yea, but that should be part of the review i suppose 17:14:01 yeah.. was going to say that 17:14:07 also, i was thinking more about if we could use barbican as a sacri^H^H^H^H^H tribute for the process? 17:14:28 oh 17:14:29 right 17:14:50 I haven't read the CR for the new process, but I'm assuming it's similar to what was discussed on the ML 17:14:55 or is that putting the cart before the horse, what with the review and all 17:14:55 I'm concerned about the audit part 17:15:04 mainly because professional security audits are not cheap 17:15:11 well, barbican already has bandit in the gate, right? 17:15:18 elmiko yes, we have bandit 17:15:28 but I read that as "hire a security firm to look at your code" 17:15:29 maybe wait for the review to land and then we can submit barbican through the process.. 17:15:30 so we know we wouldn't get slammed with a bunch of low hanging fruit type stuff 17:15:39 gmurphy: ok, yea. that makes sense 17:15:41 I think an "audit" should have a manual part, at least to go look at the bandit findings etc 17:16:03 yea, we probably need more resolution on the depth of the initial audit 17:16:08 but of course, that depends on bandwidth 17:16:25 i certainly wouldn't want to mandate that everything needs a full line-by-line code audit 17:16:50 yeah, way more than we could ever reasonably do.... but that is why we have bandit 17:16:55 elmiko +1 17:17:01 anything else on this, or can we leave it to the review? 17:17:31 could this also be a hook for the threat analysis stuff rob was talking about ? 17:17:39 other than that comment - happy to leave it with the review 17:17:40 ooh, nice idea 17:17:43 gmurphy: seems like a nice tie in 17:17:59 let's shed it out on the review =) 17:18:04 agree 17:18:08 +1 17:18:10 #topic Anchor 17:18:20 anchorites, updates? 17:18:25 Bunch of stuff in review for Anchor 17:18:31 please take a look if people have time 17:18:38 its on my list for tomorrow 17:18:41 new X509 extension handling 17:18:55 Validators now in individual modules 17:18:56 be nice to get some eyes on my spec 17:18:57 https://review.openstack.org/#/c/227384/ 17:19:06 dg_: +1 17:19:21 dg_: do you want to talk a little about it here? 17:19:28 yeah that'd be cool 17:20:00 so basically, the spec is to break out the Anchor Validation functionality into a seperate package, so it can be used by other services 17:20:37 for background, validation is the rules engine that assert a CSR is good or not 17:20:53 this will let us re-use a bunch of the anchor code to build a traditional CA/RA for generating longer term certificates, but still keep the benefits of the automated certificate validation 17:22:01 Plan is to build a lightweight python CA with a rest api, that can be admined using a horizon pane, or other stand-alone interface 17:22:16 cool 17:22:45 Would it wind up being something like https://github.com/letsencrypt/letsencrypt? 17:22:52 I like the idea dg_ and once we have a precedent, who know what other uses we may have for a CSR validation lib 17:23:15 dg_ sounds like you're planning to reimplement the CA features of Barbican 17:23:30 yeah, there sounds like there is quite a bit of overlap there 17:23:55 ...vs having anchor provide certificates for underlying openstack services themselves 17:23:57 kevinlondon similar, although last time I looked at letsencrypt, it was a public certificate provider, like verisign, not a standalone CA/RA that I could deploy in my datacenter 17:24:10 redrobot - does barbican do any automated validation? 17:24:17 Yes, letsencrypt is a public CA 17:24:18 got it, understood 17:24:33 dg_: the backend behind barbican does depending on what it is 17:24:34 yeah i think the take away here is the validation rules, there are plenty of ways to sign a cert 17:24:42 dg_ some, yes. we could definitely make use of a validation lib 17:24:43 redrobot I had considered that this may sit behind barbican as an alternative CA 17:25:00 more powerful than the snakeoil ca and lighter weight than dogtag 17:25:02 that woudl be the right approach IMHO, otherwise we have competing APIs 17:26:01 nkinder +1 it would definitely be awesome as a software-only CA for Barbican. Not a fan of adding a 3rd CA API to OpenStack 17:26:30 redrobot nkinder : +1 that sounds reasonable 17:26:45 so, is there a blueprint or spec that will be up for this idea dg_ ? 17:27:14 maybe something we can debate about in another arena 17:27:18 redrobot agreed, although for a lot of use-cases, we just want to be able to throw a CSR at a CA and get a cert back - so it would be nice it were able to operate sans barbican as well 17:27:58 elmiko yes we have talked about writing a spec, at the moment we just have a lot of whiteboard diagrams! my concern is that we may end up bikeshedding too much if we push it into a formal spec 17:28:04 dg_ that's basically what you get with the Snakeoil CA backend now. I believe DogTag is able to be configured for automatic issuance as well 17:28:24 yeah, dogtag can do that too (it depends on the cert profile that is used) 17:28:25 dg_: yea, seems like we are heading down that path now. but it sounds like there are some good ideas abound 17:28:52 dg_: would you mind writing this up for the ML? 17:29:03 elmiko yes it would be good to capture this, I'll write it up. ML or spec? 17:29:27 spec + ML shout with link would be good 17:29:29 imo spec would be better 17:29:33 tkelsey: +1 17:29:51 #action dg_ to write spec + ML shoutout about lightweight python CA idea 17:29:59 sounds good? 17:29:59 damnit, i loose at meetings 17:30:00 Sorry, I am late. 17:30:19 hey Michaelxin 17:30:26 * elmiko waves to Michaelxin 17:30:27 Ill try and get something up and out tomorrow/monday 17:30:33 dg_: awesome thanks! 17:30:43 #topic Bandit 17:30:51 tkelsey... 17:30:56 lots of cool stuff in Bandit as ever :) 17:31:07 we are pushing on test coverage and docs 17:31:08 Thanks Tim 17:31:15 thanks, Tim! 17:31:22 awesome 17:31:26 I'll be talking to Rob about getting our docs published soon 17:31:42 kevinlondon: would you like to mention some of your findings? 17:31:46 The docs that are there are very helpful tkelsey 17:32:02 kevinlondon: :) 17:32:20 the docs would be handy when upgrading and enabling new tests. 17:32:29 Sure, so I scanned 16 popular open-source projects over the weekend with Bandit to see how we're doing with security. I wasn't expecting to find all that much tbh 17:32:43 I wound up finding things in 11 of the projects I checked, so I submitted 9 PRs and 6 issues 17:32:48 ooh, nice! 17:33:02 Some of the most common ones are untrusted urls in urllib, shell=True, loading things with yaml, using pickle 17:33:11 do other projects have a vulnerability management process? 17:33:15 The asserts disappearing surprises people too 17:33:33 that's a fun one 17:33:33 I didn't find one in many of the CONTRIBUTION guides that repos include 17:33:34 kevinlondon: awesome work :) 17:33:36 or are these not bad enough 17:33:47 They're not awful, they're pretty small 17:33:57 In one case, a project was using tempfile.mktemp() 17:34:05 They used the right thing in every other place, it was just that one 17:34:23 are these projects going to sign up to bandit gating now? 17:34:23 In another case, a distributed client / server CI thing was using urllib without checking the url it was going to 17:34:26 I filed that one privately 17:34:35 I'm not sure, I included a link to bandit whenever I filed an issue / PR 17:34:41 great 17:34:45 nice 17:35:06 I'm giving a talk tonight on my finding at http://www.meetup.com/socalpython/events/225224958/, currently 122 people RSVPed 17:35:24 awesome, good luck! 17:35:29 I'd like to see a post to the openstack-dev mailing list with this info, we could use more reasons for openstack projects to run it. 17:35:35 Mostly covering the code itself and then talking about why it has security implications. I'm including bandit outputs. I'll send a link to the slides once I post it 17:35:49 bknudson: +1 17:35:49 In all cases I changed it so it doesn't uniquely ID the project 17:35:53 It's not about pointing fingers :) 17:36:06 that's a good attitude, imo 17:36:07 thanks! 17:36:11 kevinlondon: that sounds really good 17:36:12 that's a long ways for me to go for a meetup 17:36:21 hahaha 17:36:21 lol, likewise ;) 17:36:31 hehe yeah 17:36:42 any other bandit news? 17:37:12 #topic Developer Guidance 17:37:25 i'm not sure where we left this, and i think it was a rob topic 17:37:38 yeah, Rob is driving this one 17:37:50 i think we were going to buff up the website, but haven't heard anything about it 17:37:51 maybe table it for next time? unless anyone has input? 17:38:03 yea, anyone have a comment for this topic? 17:38:39 #topic Security Documents 17:38:54 sicarie__: any updates? 17:39:06 Nothing this week 17:39:16 I was suposed to send out an update email but was sidetracked at work 17:39:28 Just scoping what state we want tog et to before Mitaka and pushing for that 17:39:40 ok, cool 17:40:01 #topic Security Notes 17:40:12 thanks to everyone who's been working on these 17:40:18 we've had a bunch merge in the last week 17:40:20 I published 5-6 notes since last week's meeting 17:40:34 many thanks nkinder =) 17:40:41 I think everythign in the queue now needs to be updated by the author(s) 17:40:43 we were pretty backed up 17:40:47 yea 17:41:51 looks like we 4 that are untriaged and have no assignee 17:42:10 +1 17:42:14 we need another meetup 17:42:17 maybe something to checkout in the next week or so 17:42:20 Yeah, a few need to be picked up 17:42:47 Anyone interested can look at the queue here - https://bugs.launchpad.net/ossn/ 17:43:18 and at this point, we have a lot of good experience spread around for writing them. so... ;) 17:43:52 #topic Syntribos 17:43:58 Michaelxin: any updates ? 17:44:42 The project was finally merged to openstack this week. 17:44:50 \o/ 17:44:53 there's a repo? 17:45:09 yes 17:45:25 http://git.openstack.org/cgit/openstack/syntribos/ 17:45:36 #link http://git.openstack.org/cgit/openstack/syntribos/ 17:45:43 thanks bknudson 17:46:19 and does syntribos have a git review process and everything, can we create reviews against it? 17:46:46 Thanks. 17:46:48 #link https://review.openstack.org/#/q/project:openstack/syntribos,n,z 17:46:49 Yes. 17:46:50 no reviews 17:46:57 yet 17:47:03 awesome, very cool 17:47:06 I will get other stuff ready this week. 17:47:29 Sorry, I am on my phone. 17:47:50 no worries 17:47:58 so syntribos is officially on gerrit etc now? 17:48:01 Will meet with my team and come up with action items tomorrow 17:48:05 tkelsey: yea 17:48:15 who's the core team? 17:48:21 nice 17:48:32 https://review.openstack.org/#/admin/groups/1093,members 17:48:33 nobody 17:48:52 i would imagine Michaelxin will be the PTL? 17:49:11 I will update this week. 17:50:12 #topic Any Other Business 17:50:19 anything thing else? 17:50:21 Michaelxin: awesome, looking forward to contributing :) 17:50:39 Thanks. Tim 17:51:05 I asked the gus who's proposing the privsep work if he wants it in ossg rather than oslo 17:51:19 some people didn't know ossg had repos 17:51:23 any word back? 17:51:32 last I saw he didn't care where it went 17:51:45 an interesting idea though, and makes sense imo 17:52:40 maybe something to discuss at a tc meeting or ptl meeting if rob is there 17:53:02 +1 17:53:22 I think it fits in with ossg as much as oslo, and would take some of the load off oslo 17:53:49 that's kinda what i was thinking too 17:54:32 ok, anything else? 17:55:10 have a good weekend all! 17:55:14 #endmeeting