17:00:01 #startmeeting Security 17:00:04 Meeting started Thu Oct 1 17:00:01 2015 UTC and is due to finish in 60 minutes. The chair is hyakuhei. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:05 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:08 The meeting name has been set to 'security' 17:00:11 #chair tmcpeak 17:00:14 Current chairs: hyakuhei tmcpeak 17:00:15 Hey all! 17:00:19 hey 17:00:22 * sicarie waves 17:00:23 yo! ~o/ 17:00:24 hai 17:00:42 oh, hai! 17:00:45 o/ 17:00:56 * bknudson lurks 17:01:06 heh 17:01:10 * tmcpeak pulls bknudson out of his corner 17:01:21 Hey elmiko! Thanks for helping out with the meeting! 17:01:24 Hi all! 17:01:31 yo, Mr. Kinder 17:01:32 hyakuhei: no problem, glad to help 17:01:36 nkinder? 17:01:39 * hyakuhei squints 17:01:41 haha 17:01:44 is that nkinder in the distance ? 17:01:44 hi everbody 17:01:51 hi 17:01:53 hey yaya, wassup 17:02:05 been awhile :) 17:02:22 Sweet, so… Agenda 17:02:43 Anchor, Bandit, OSSN, Docs, Syntribos, PR 17:02:45 what else ? 17:03:02 elmiko's architecture bonanza? 17:03:25 separating the less trusted things from the golden things, etc 17:03:28 Yeah, I’ve only just looked through that but I think it needs some massaging first. 17:03:38 i've been looking briefly at Horizon logging and could do with some opinions (eek) 17:03:38 i've only shared the doc internally and with hyakuhei, not sure it's ready for primetime yet 17:03:39 oh, I haven't even seen it 17:03:46 (I literally opened it two mintues ago) 17:03:50 lol! 17:03:50 o/ 17:03:54 tmcpeak: you were there when we whiteboarded it :P 17:03:59 hey redrobot 17:04:15 oh yeah, I know that. I mean the finished product 17:04:30 Sweet, lets leave that for next week 17:04:37 tkelsey sends his appologies 17:04:40 #topic Anchor 17:04:48 dg_: what’ve you guys been up to ? 17:05:10 tkelsey and I spent a day pretending we worked at a startup, sat in a coffee shop hacking code 17:05:38 anchor now has a sperate validation module, so you can import anchor.validation and do cert validation 17:05:39 nice 17:05:56 Yeah that’ll be handy 17:06:24 it now returns a dictionary, of {validator:result} so you can see the results for individual validators, rather than complete list 17:06:37 #link https://review.openstack.org/#/q/anchor+status:open,n,z 17:06:53 o/ 17:07:00 That sounds useful dg_ 17:07:05 welcome dave-mccowan 17:07:30 Cool 17:07:34 i think thats merged too 17:07:44 Nice work :) 17:07:57 Anything else? 17:08:09 thats all the anchor stuff I can think of 17:08:22 Great! Thanks 17:08:25 #topic Bandit 17:08:29 yo 17:08:39 so Kelsey has been smashing docs like a possessed man 17:08:48 haha 17:08:55 he's a beast 17:09:01 check out the reviews if you haven't already 17:09:10 #link https://review.openstack.org/#/q/bandit+status:open,n,z 17:09:10 our plan is to release new Bandit after the docs are done 17:09:57 I can't even keep keystone up with the previous release. 17:10:07 heh 17:10:25 looking at the multiprocessing change, i think it's a useful POC but probably needs some more work / refactoring to do it 'nicely' 17:10:46 yeah, we'll punt on multi-processing until 0.15.0 if it's cool with you guys 17:11:03 it might break things 17:11:08 we want to test the crap out of it first 17:11:23 bknudson: i think once we refactor bandit.yaml so that other projects don't have to update it, then it'll be a lot easier to stay current 17:12:00 anything else? 17:12:06 that would make things easier. having a bunch of options for the tests in bandit.yaml makes for more work. 17:12:07 that's about it for this week 17:12:19 +1 17:12:28 yeah, that's not a great user experience 17:12:44 ok cool, ploughing on through :) 17:12:49 #topic OSSN 17:12:53 ok, i want to look into that some more 17:13:08 So our backlog looks a lot better now for OSSNs 17:13:16 \o/ 17:13:23 I published another one last week, and there are a few in progress 17:13:28 There’s still a few sitting open #link https://review.openstack.org/#/q/status:open+security-doc,n,z 17:13:33 The trusted compute pools one is close - https://review.openstack.org/#/c/220263/ 17:13:50 We just need to fix up the terminology a bit, then get a nova reviewer 17:14:16 Think we could get malini to review #link https://review.openstack.org/#/c/220263/ ? 17:14:38 yeah, that's what I was thinking too 17:15:01 Probably should consider abandoning or updating #link https://review.openstack.org/#/c/136203/ 17:15:04 We should have Michael fix up the terminology first, then we can get the reviews going 17:15:06 Malini still around? 17:15:23 hyakuhei: Yes, that one has rotted 17:15:38 She’s still working in the space but not around atm, I’ll ping her an email 17:15:59 Anything else required on the OSSN front nkinder ? 17:16:03 nkinder did you notice that Nova began the process of deprecating TrustedComputePools by marking it "experimental"? it might be worth calling that out in this note. 17:16:40 dave-mccowan: Yeah, that's worth calling out. Do you mind adding a comment in the review for Michael? 17:16:59 nkinder will do. 17:17:00 hyakuhei: nothing else really at this point. 17:17:07 cool, thanks nkinder 17:17:19 #topic Security-docs 17:17:25 sicarie: How’s things going ? 17:17:29 Pretty well 17:17:36 We're outlining the work to be done for the new leaf release 17:17:45 I think the COmpute chapter is relatively complete for now 17:17:49 hows the RST magics going ? 17:17:50 I'm going to finish the case studies 17:18:01 So much nicer than DocBOok 17:18:23 And then the only other effort called out was getting a generalized "checklist" into each chapter 17:18:44 I think once we hit that I'm going to wrestle with the table conversions and submit for new leaf book - hopefully coinciding with the Tokyo Summit 17:19:00 If anyone sees any gaps, please open a bug or ping me 17:19:00 +1 17:20:03 And that's about it for docs righ tnow 17:20:13 Great stuff! 17:20:20 #topic syntribos 17:20:34 Anyone here to talk about this ? 17:20:40 sure 17:20:47 :) 17:20:54 we're working on some general improvements to reporting 17:21:10 and better detection on the SQLi attacks 17:21:17 did you get things worked out with the infra folks concerning cores and what not? 17:21:33 not yet that i know of 17:21:42 Michael is working on that 17:21:52 yea, just curious how that's going 17:22:20 i think that is new for us, so if anyone has expertise... :) 17:22:45 and that's really the only updates we have 17:22:52 i think michael is on the right path, he was asking some questions in channel yesterday(?) 17:23:10 awesome 17:23:20 thanks =) 17:23:49 thanks for the help 17:23:54 Anyhting else to cover ? 17:24:08 * hyakuhei just got grabbed on another meeting so I’m multi tasking! 17:24:18 @hyakuhei I can take over if you want 17:24:30 please 17:24:31 Michael is joining in now 17:24:35 :) 17:24:43 cool 17:24:49 ok, anything else to say for Syntribos or shall we move on? 17:25:20 michaelxin: wassup 17:25:25 anything to say for Syntribos this week? 17:25:30 tmcpeak: sorry I am late 17:25:34 tmcpeak: Yes. 17:25:39 no worries 17:26:03 The sytribos-core is not working and am working with openstack infrastructure team on it. 17:26:18 core? 17:26:18 At the same time, our team is currently working on reporting of security issues. 17:26:26 have I missed something from last week? 17:26:26 yes. 17:26:34 I should probably be a non-crappy chair and read logs huh? 17:26:52 It was merged into openstack 17:26:56 as long as somebody knows what we're talking about we can keep rolling ;) 17:27:02 there's a bunch of security issues? 17:27:08 I hope they're not in keystone 17:27:31 But the syntribos-core group on review.openstack.com is empty. 17:27:39 =( 17:27:42 we are working to improve syntribos' reporting of issues it finds 17:27:55 reporting how? 17:28:02 back now (stupid life or death sales people) feel free to keep on rolling tmcpeak 17:28:23 right now it writes to a log file 17:28:30 A list of identified security issues with severity and description, etc. 17:28:32 all you Mr. Hyakuhei, we're still on syntribos 17:28:33 we want to make the reporting more digestible 17:28:40 JSON is useful IMO 17:28:47 we use that a lot internally 17:28:59 We will make it consistent with Bandit 17:29:00 +1 17:29:04 nice 17:29:11 Forgot to mention. 17:29:25 I have recruited some of my team members to our group 17:29:27 michaelxin: awesome, was just talking to chair6 about a standardized reporting format earlier too 17:29:33 bknudson: we didn't find issues per se, but when syntribos does, we want the reporting to be better 17:29:49 michaelxin: awesome!! you're singing my song, who we got? :D 17:30:07 I’m all for good reporting 17:30:18 hi, rackers, would you please introduce yourself? 17:30:39 but a little voice in the back of my head says it should be complicated enough that “pentesters” dont just start emailing me invoices and “Syntribos Reports”... 17:30:40 hey everyone, I’m Michael Dong, I’m pretty new to the Rackspace security team 17:30:48 hyakuhei: +1 17:30:53 awesome mdong! great to meet you 17:31:01 maybe a few sentences about your background and interests? 17:31:03 hi. I'm henry yamauchi. Hi all. Just lurking for now... 17:31:10 hey 17:31:22 Henry is from Rackspace too. 17:31:23 hyamuchi: lurking is cool but hanging out with us is better, the more the merrier! 17:31:27 Pesky rackers everywhere! (Welcome :D) 17:31:27 hi mdong 17:31:31 Hey everyone, I'm Greg Anderson. Also part of RAX and here to help with syntribos :) 17:31:36 and I am Yasmine K 17:31:45 wow! this is awesome 17:31:52 greg_a is from Rackspace too. 17:32:02 Rackers, could you each please type a couple of sentences about your backgrounds and what interests you? 17:32:08 yea, lots of hellos =) /me waves at hyamauchi greg_a and yaya 17:32:14 greg_a is our Defcon speaker here. 17:32:29 michaelxin: this is great, glad you've brought such fine folks to us 17:32:29 :-) 17:32:39 +1 17:32:40 We missed ccneil 17:32:46 +1 Welcome all! Good to have some fresh faces here. 17:32:51 ++ 17:32:55 He is the one who contributed to Bandit. 17:33:18 ahh yeah, I'm familiar with ccneil. The HTML report is a great addition 17:33:36 I just graduated from University of Texas at Austin this May, right now it’s the UT football team that interests me, but I’m pretty excited to work on Syntribos! 17:33:50 hehe 17:34:04 That's me :D, as mentioned tricked the defcon folks into letting me present. I dabble in all things security: pen testing, IDS, etc. Also have Dev experience and I'm excited to help out and be a part of this :) 17:34:06 awesome! great to have you mdong 17:34:09 cool, glad to see our team grow. 17:34:19 greg_a got a link to your preso? 17:34:29 I love watching good defcon presos 17:34:30 yep one sec 17:34:55 sweet 17:35:12 yaya: would you give us some introduction too? 17:35:26 Great having some fresh blood in the group! Is this just Syntribos focussed or while you guys be poking around other bits of the security cave too ? 17:35:55 hyakuhei: We will help with everything 17:35:58 I’ll definitely try to contribute as much as I can all around 17:36:04 sweet!! 17:36:07 whatever hyakuhei asks us to do. :-) 17:36:11 all the things! 17:36:15 :D 17:36:28 lol 17:36:28 I love you rackers, I’ve always said “I love them Rackers” :P 17:36:31 yup. So I’ve been with the team for almost a year now. Interested in all things security from pentesting to research :) 17:36:49 hyakuhei: +1 17:36:58 tmcpeak: +1 17:36:58 Fantastic. 17:37:08 tmcpeak: here it is https://www.youtube.com/watch?v=H1l-9Z8TOAg 17:37:11 #topic Any Other Business 17:37:22 greg_a: awesome, wil check it out 17:37:24 chair6: Did you have some logging ideas? 17:37:30 just a small one 17:37:32 greg_a: awesome thanks! 17:37:36 also I wanted to give a brief shout about PR 17:37:43 i've been trying to actually use openstack log output in anger 17:37:45 thanks greg_a , and the other rackers, always nice to meet some new sec. folks =) 17:37:49 devstack@devstack:/var/log/apache2$ tail -f horizon_error.log | grep failed 17:37:52 2015-09-29 20:22:29.683986 Login failed for user "admin". 17:37:55 2015-09-29 20:22:46.032374 Login failed for user "blahblah". 17:37:57 2015-09-29 20:23:20.997693 Login failed for user "blahblah". 17:38:05 tmcpeak: no prob! I start around 10:40 17:38:12 something like ^ is not particularly useful though .. a source IP would be a nice additino 17:38:12 elmiko: +1 17:38:31 wondering if anyone has worked on horizon before, before i go chasing this and other potential similar cases down myself.. 17:38:31 +1 17:39:05 Don’t we sell super expensive connect the dot machines to do this ? 17:39:08 * hyakuhei hides. 17:39:19 fwiw I think this would be very useful 17:39:44 About 18 months ago there was some discussion of finding a way to trace API cascades from individual inputs 17:40:07 keystone at least puts the request ID in its logs now 17:40:11 ccneill: Would you please introduce yourself? 17:40:17 Yeah that’s a good step forward 17:40:19 chair6: have you been following any of the logging-wg stuff? 17:40:25 there's a spec to have the APIs provide the request IDs to the callers 17:40:32 the python APIs 17:40:53 yea, that's a good one too 17:41:13 elmiko - i remember reading some logging-related stuff ~6 months ago but didn't see any evidence of progress .. maybe i'm not looking in the right place 17:41:51 chair6: yea, not sure much has happened, aside from some error logging related stuff 17:42:06 well, and what bknudson mentioned 17:42:49 can you easily trace the request Id to a specific API? 17:43:09 or does that still require some detective work 17:43:17 good question 17:43:31 you can't easily track request IDs at all now 17:44:01 the work hasn't been done 17:44:03 jfdi 17:44:49 interesting .. 17:44:58 #JFDI 17:45:28 okay, well what i might (if i have time.. sigh) start working on is some security-related scenarios and seeing what it takes to track them back through various logs .. see where gaps are, what simple fixes there mgith be, etc 17:45:42 chair6: +1 17:45:54 your horizon UI is being bruteforced? how does that manifest, how do you invesitgate, etc 17:46:00 and so on for other attack scenarios 17:46:04 sounds like a worthy effort 17:46:08 chair6: you won't 17:46:15 lol, yeah, time... 17:46:23 tmcpeak: way to stay optimistic 17:46:28 :D 17:47:01 chair6: i'd be curious to talk about it sometime, we're working on something along those lines for our presentation in tokyo 17:47:19 oh, presentation? now you're singing chair6's song :P 17:47:23 (ie how to use logs to see certain behaviors) 17:47:29 cool.. how about we setup an etherpad or something and start throwing some thoughts into it? 17:47:41 sounds good 17:47:44 presentations are good as long as they're only made up of photos of people watching clouds 17:47:50 +1 17:47:51 haha 17:48:39 I didn’t have anything else to cover today, anyone else ? 17:48:47 tmcpeak: How about the PR deck? 17:48:49 chair6: I wonder if CADF notifications can be used for watching for these sorts of attacks 17:48:53 #link https://etherpad.openstack.org/p/security-logging-investigation 17:48:56 s/PR/recruitment 17:49:00 sweet 17:49:02 https://docs.google.com/document/d/1g2LVI_oR8sNAuiAB5VW1RYRV9afD_D6BboSYFQX7lDs/edit?usp=sharing 17:49:09 nkinder i've been looking at CADF as well, that has some gaps / frustrations too 17:49:23 hyakuhei: do you want just stay in touch via email about the "canhaz" project? ;) 17:49:27 so this is something I've written (with hyakuhei's help) for SuperUser magazine 17:49:32 the OpenStack thing 17:49:32 like it logs a user UUID but not a plaintext username, so it takes some wrapper / work to make it human-useful 17:49:44 http://superuser.openstack.org/ 17:49:51 the idea is to boost our numbers 17:50:05 as you all know I've been all "we should have more ppl, we're spread thin, etc" 17:50:05 elmiko: yeah, I’ll throw it into google docs and share it with you, which should let us both edit 17:50:20 hopefully the superuser article can help us get publicity for our projects and group and get some further fresh blood 17:50:35 please take a look, let me know if you like it or hate it, but.. 17:50:41 hyakuhei: wish i could just share my google doc... ಠ_ಠ 17:50:42 it's pretty much going out regardless :) 17:50:54 sent it to the foundation folks 17:51:15 aside from that: any of our chapters have any luck scheduling things? 17:51:27 or shall I go around and annoy you all until you do it? :P 17:51:38 Seattle is GTG 17:51:42 UK: where you at? 17:51:46 San Antonio? 17:51:48 I think Michael is working on something for our OWASP chapter 17:51:50 Minnesota? 17:52:05 San Antonio 17:52:08 tmcpeak say where and when, we'll be there 17:52:09 UK stalled out slightly because of a few things like Discover, I’ll try to make a note to find a venue 17:52:17 I'll push that along :) 17:52:25 hyakuhei, dg_: you guys want to book it yourself or you want me to? 17:52:29 I'm happy to do either way 17:52:33 turns out i'll be presenting to CSA Seattle on oct 22 so will definitely put in some PR content there 17:52:42 chair6: oooh, sweet 17:52:42 I haven't heard about the next minnesota meetup. 17:53:02 tmcpeak not fussed 17:53:18 i think there is some stuff happening in bristol, but not looked into it 17:53:20 browne: I'll ping you offline, looks like I'll be back in the bay in early December so I'll make sure whatever I set up works for both of us, sounds good? 17:54:05 tmcpeak: sounds good 17:54:09 sweet 17:54:21 ok, so hyakuhei will look into Bristol 17:54:28 michaelxin: how's San Antonio coming? 17:54:36 bknudson: you want help with Minnesota or you good? 17:54:47 tmcpeak: he got called away 17:54:58 ahh ok, you guys can work it and let us know next week 17:54:58 we are looking at doing something for October OWASP meeting 17:55:03 perfect 17:55:21 and we are speaking at LASCON in October, so can give a mention there as well 17:55:23 tmcpeak: I'm good. The next meetup is this month but it's already booked, so need to get on the agenda for the next one. 17:55:30 cool, sounds good 17:55:58 tmcpeak: the google doc is great and will be a big help 17:56:22 mvaldes: great, you mean the deck, right? 17:56:51 tmcpeak: didnt see that. i was looking at the superuser article 17:57:08 oh cool 17:57:10 glad you like it 17:57:23 got a link to the superuser article? 17:57:27 michaelxin should have the link for the deck. We're hoping that the recruiting efforts can centralize around that 17:57:28 tmcpeak: can you link to the deck? 17:57:33 ok cool 17:57:42 dg_: https://docs.google.com/document/d/1g2LVI_oR8sNAuiAB5VW1RYRV9afD_D6BboSYFQX7lDs/edit?pli=1 17:57:54 https://docs.google.com/document/d/1g2LVI_oR8sNAuiAB5VW1RYRV9afD_D6BboSYFQX7lDs/edit?usp=sharing 17:58:18 thanks 17:58:23 cool, so wrapping up 17:58:27 any final words? 17:59:01 lgtm :) 17:59:03 excellent 17:59:05 #endmeeting