17:00:53 #startmeeting security 17:00:54 Meeting started Thu Dec 3 17:00:53 2015 UTC and is due to finish in 60 minutes. The chair is tmcpeak. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:56 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:56 #chair hyakuhei 17:00:58 The meeting name has been set to 'security' 17:00:59 Current chairs: hyakuhei tmcpeak 17:01:00 hyakuhei: Error: Can't start another meeting, one is in progress. Use #endmeeting first. 17:01:01 heh 17:01:07 Thanks tmcpeak 17:01:08 :P 17:01:10 Hi all 17:01:11 take it away sir 17:01:14 o/ 17:01:21 hey nkinder 17:01:24 fyi - I'm only half here (in another meeting) 17:01:27 hey nkinder ! 17:01:29 fair enough 17:01:32 hi 17:01:33 Push OSSN stuff to the end please 17:01:42 cool 17:01:43 righto! 17:02:10 Okiedokie I guess we can get started 17:02:17 #link https://etherpad.openstack.org/p/security-20151203-agenda 17:02:20 Agenda ^ 17:02:39 nice 17:02:50 I like this etherpad approach 17:03:02 Normally I like to share them earlier 17:03:07 bumped OSSN to the bottom of the list 17:03:19 As per nkinder :) 17:03:28 Hmmm, no redrobot here. 17:03:42 ok, so I also knocked this together 17:03:46 no michaelxin either 17:03:48 #topic Publicity 17:03:55 #link https://etherpad.openstack.org/p/security-raising-profile 17:04:12 Etherpad for ideas on how to raise awareness as well as tracking which teams we’ve spammed :) 17:04:12 here 17:04:18 oh nice 17:04:21 sorry that I am late 17:04:30 half here too. 17:04:45 General idea is that you look through, pick a few in your timezone and drop in on their meetings, add something to the teams agenda if you can 17:05:19 The boilerplate part is there for us to work on some messaging, make it easier to be consistent in meetings 17:05:34 cool, shall we prioritize in some way? 17:05:38 that's a huge list 17:05:47 +1 - huge list 17:05:49 That’s almost every team 17:05:53 I’m happy to cut 17:05:55 we need some security champs 17:06:07 +1 for prioritizing 17:06:17 michaelxin: While I agree, for the most part we need champs to come to us 17:06:32 That is to say, people like bknudson who work on another project but also want to dip into security 17:06:56 +1 - too many groups for us to be involved with each 17:07:08 seems easier and more effective to get people interested in security within a project 17:07:10 hyakuhei: I was noticing this week that the neutron api folk put out a request to -dev for liaisons 17:07:11 I think the best we can do is increase our visbility and accessibility - if we build it, they come 17:07:34 the bandit work should help 17:07:35 sicarie: We’ve tried that (years ago) - lets see if they get traction with that. 17:07:45 bknudson: agreed 17:07:48 maybe we need to make it clearer that bandit is an ossg project? 17:08:21 bknudson: I’d like to bask in the Bandit glory :D 17:08:29 hehe 17:08:42 I assume we'll be needing a big push again once we get the baseline gate working 17:09:00 at that point I'd imagine most projects should be ready to do at least a non-voting gate to start 17:09:28 so how should we go forward on this? 17:09:43 we can brainstorm for some ideas 17:09:52 maybe get a few of us interested 17:09:56 it might be a good topic for mid-cycle 17:09:58 then each sign up for 2 meetings to start? 17:10:12 Well, start with some more boilerplate on that etherpad. It’d be good if everyone just picked a couple of meetings. 17:10:29 1) drop something on the meeting agenda, 2) introduce ourselves and our mission, 3) ask if anybody is interested in security? 17:10:35 Prioritising is great but to start with just picking those meetings that fit most easily with your schedule is fine 17:10:40 tmcpeak: Pretty much 17:10:42 ok, I'll pick a couple now 17:10:56 It would be ncie to have the Boilerplate really become more of an FAQ. 17:11:36 I will sign up two 17:12:02 ok I'll take OSLO and Heat to begin 17:12:15 Great, put your name by them 17:12:37 good work hyakuhei 17:12:43 +1 17:12:47 and then just strike them out (line through) when done? 17:13:10 will do 17:13:12 I’ll prune the list a little later, groking the meeting info has resulted in entries for _everything_ 17:13:15 we should make sure that people are clear that ossg isn't keystone 17:13:30 hehe 17:13:32 wut? 17:13:34 since I would think most people think that keystone handles security for their project 17:13:43 oh.. like that 17:13:44 most developers 17:13:50 well then we've got some work to do 17:14:08 bknudson: Thanks for letting us know 17:14:38 Absolutely, that’s why I figured having some boilerplate text might be useful 17:15:08 I’ll also push to have a security-project presentation at each of the summits moving forward. 17:15:13 yeah true 17:15:17 how should we approach that? 17:15:24 we can point to the deck too 17:15:48 tbh, I’m not sure it’s that important, not many devs go to the conference talks. 17:16:32 But yeah, we need to think of other things to raise profile too 17:16:40 We tried one for Tokyo 17:16:44 I just mean we can pull the boiler plate from the deck 17:16:45 only two showed up 17:17:00 I think the best way to raise the profile in other projects is to get involved 17:17:10 bknudson: +1 17:17:15 for example, push changes to enable bandit 17:17:17 definitely - I'm just not sure we have the resources 17:17:20 we need more bknudson's 17:17:54 we have to prioritize... maybe it's more important to get bandit in the projects rather than adding new features 17:17:59 I’ll be able to put some more effort from my team into pushing bandit out to other projects. 17:18:10 bknudson, possiblilty for parallel tracks 17:18:22 It doesn't hurt to go to the meetings and ask for volunteers 17:18:27 It’s also possible that integrating with other projects might be more approachable than creating new features 17:18:33 sometimes devs are looking for interesting work 17:18:43 yeah - if we just double down on getting a bandit gate in most of these, then they'll have had a (hopefully good) introduction to the security team 17:18:56 and ideally be more comfortable reaching out for design decisions and the other stuff we do 17:19:29 getting reminders from bandit that they don't know security should help. 17:19:29 Demonstrating value is always a good way to get buy-in 17:19:40 bknudson: :D 17:20:35 lol yes that too 17:21:15 how about an action plan to get a project using bandit with the new baseline feature, write up how it's done, and post a message to the mailing list 17:21:18 Anything to discuss re: Bandit specifically ? 17:21:31 then when you attend the meeting ask for help with this. 17:21:34 bknudson: that sounds like a great approach 17:21:38 Agree 17:21:48 ok cool, tkelsey or I can take that action 17:22:16 I'm guiding one of our internal teams through setting up the baseline gates currently :) 17:22:30 that should be it for Bandit 17:23:14 I’d be interested in helping out 17:23:17 awesome 17:23:28 let's shoot for that as the next step then 17:23:38 Throw it in the etherpad. 17:23:45 shouldn't be too bad, I've already got the requisite jenkins job manager magic 17:23:51 ok 17:23:59 Thanks tmcpeak ! 17:24:34 cool, np 17:25:26 Ok, lets roll on. We don’t have dg_ or tkelsey as they’re at HPE Discover 17:25:28 we don't need baseline for keystone since we've got it deployed 17:25:30 #topic Bandit 17:25:40 Anything else going on here that you’d like to discuss? 17:25:53 so we have a proposal to fix config 17:26:12 https://review.openstack.org/249128 17:26:37 basically config has been one of the major pain points 17:26:48 the file is huge, if you update Bandit a lot of times your old config doesn't work as expected, etc 17:27:16 so basically the idea is to break it up. Some stuff can be flat out removed, other stuff will be moved to dedicated profile files, and the config generator will be adapted to build profiles easily 17:27:27 I encourage you all to read it if you haven't yet 17:27:32 the proposal looks like it'll be a nice improvement 17:27:48 nice, i missed that spec 17:27:50 the bandit upgrade changes have been difficult to review 17:27:50 bknudson: awesome, was hoping you'd think so 17:27:55 (our most loyal customer) 17:28:13 bknudson: upgrade changes? 17:28:27 yes, when we're supporting new versions of bandit 17:28:31 and the config file changes 17:28:32 oh yeah.. 17:28:38 so this should obviate the need to do that 17:28:41 it's difficult for reviewers to know if it's correct or not 17:29:02 basically what you'll do from a keystone perspective is run "bandit —include 101-150" or something 17:29:07 and then it will just run the right tests 17:29:12 yea 17:29:23 similar to how PEP8 works 17:29:27 no config file? 17:29:29 nope 17:29:34 you can have a profile file 17:29:38 that specifies which tests and settings 17:29:45 and if you have that profile it'll work from one version to the next 17:30:08 bc each plugin has defaults values for what it needs built in 17:30:08 that works as long as it doesn't put too many lines in the tox.ini 17:30:19 bknudson: it'll be really small tox.ini 17:31:32 we'd like to get these done before midcycle but who knows 17:31:40 that special not working time of the year is rolling on up 17:31:47 tmcpeak: when is midcycle? 17:31:52 speaking of the midcycle, we don’t have a whole-lot of signups 17:31:53 Jan 11-15 I think 17:31:59 #link https://etherpad.openstack.org/p/security-mitaka-midcycle 17:32:12 Has Rackspace confirmed the space now? 17:32:18 hyakuhei: yes 17:32:26 We booked the conferences for both 17:32:28 teams 17:32:48 yeah we don't… time to scare up more participants! 17:32:54 Wonderful, I thought was the case but thank you for the confirmation. 17:32:59 We also booked some small conference rooms if we want to break into small groups 17:33:01 #topic Midcycle 17:33:04 Perfect 17:33:05 :) 17:33:07 I might be able to get another couple to go. I have to advertise it. 17:33:25 I wasn't sure if the dates were confirmed. 17:34:06 #link https://wiki.openstack.org/wiki/Sprints 17:34:11 The dates should be 01/12-01/15 17:34:16 Tuesday to Friday 17:34:21 so.. who wants to go to midcycle and hasn't signed up? 17:34:26 I’ll add ours now 17:34:39 thanks! 17:34:40 i want to, but need to confirm with mgmt 17:35:06 Barbian team's mid-cycle is from Monday to Wednesday 17:35:08 sigmavirus24: it's in your backyard, you should come 17:35:14 So we have two day overlapped. 17:35:26 oh? 17:35:26 where? 17:35:54 It should give us some time to work together. 17:35:55 hm 17:35:59 sigmavirus24: in the castle 17:36:26 I will talk to my manager 17:36:29 sweet 17:38:32 and approved 17:38:37 haha damn 17:38:38 nice 17:39:25 sigmavirus24: +1 17:39:29 allright so, in conclusion - sign up if you haven't and you'd like to come to midcycle 17:40:02 +1 17:40:08 recruiting? 17:40:12 or nkinder.. 17:40:19 #topic Recruiting 17:40:25 sweet 17:40:32 Which kind of overlaps with the publicity stuff 17:40:33 I've got a slot at the OpenStack meetup in the bay 17:40:37 Excellent! 17:40:39 Jan 21st I think 17:40:43 browne said he'll come too 17:40:46 ccneil delivered a talk for Austin Openstack meetup 17:40:51 nkinder would but he's actually pretty far in the boonies now 17:41:01 michaelxin: legit! 17:41:05 anything come from it? 17:41:08 Yeah, I'm not sure if I'll be down there at that time 17:41:08 A couple of people showed interest in Bandit 17:41:13 and how was it received? I think he's the first 17:41:25 none is interested in OSSP. :-( 17:41:46 how many people turned up? 17:41:53 30+ 17:42:08 Visa gave a talk before our talk. 17:42:15 any feel for demographics? 17:42:28 I do not know. 17:42:30 I was not there. 17:42:46 We will host a OWASP San Antonio in two weeks. 17:43:01 We will handle out flyers. 17:43:03 nice! 17:43:10 Superb! 17:43:15 o/ 17:43:21 And talk with people about OSSP 17:43:46 elmiko: you made it afterall :) 17:44:07 tmcpeak: my talk ended a little early =) 17:44:24 awesome 17:44:38 welcome elmiko 17:44:47 nkinder: you around to talk OSSNs now ? 17:44:53 Sure 17:44:58 #topic OSSN 17:45:17 So there's an embargoed one that I'm working on that's quite close to being opened up 17:45:34 yep, that ones looking good 17:45:40 The way the issue is being handled has changed since I drafted the note, so there are some minor changes needed. 17:46:05 There was another issue that was embargoed that tmcpeak and hyakuhei worked on 17:46:11 maybe we can get some other folks to look at the proposals, maybe they have a different opinion 17:46:29 nkinder: Does that need another look? 17:46:30 I believe the issue is public now, but the note was never proposed as a review 17:46:49 wait, which one is this? 17:47:04 hyakuhei: OSSN-0060, which is in the embargoed repo we use 17:47:20 is that the one we distributed through the OSSA channel? 17:47:29 I think so yeah 17:47:35 it never got the final release? 17:48:27 I thought it did.. 17:48:33 so are we dropping the OSSN? If so, we should close the OSSN bug for it and free up the OSSN number 17:48:57 no it should just be released as a public OSSN now 17:49:27 tmcpeak: ok, do you want to propose the review since you worked on writing it? 17:49:30 Yeah, I think it just goes out as normal 17:49:33 then I can review it 17:49:35 I can help with that. 17:49:47 ok, great. 17:49:54 nkinder: sorry I missed your comments about 0060 17:49:58 I don't read gud 17:50:04 The queue of OSSNs is looking pretty good 17:50:13 There are 3 to be picked up 17:50:25 one new one came in last week that should be easy - https://bugs.launchpad.net/ossn/+bug/1516031 17:50:25 Launchpad bug 1516031 in Glance "Use of MD5 in OpenStack Glance image signature (CVE-2015-8234)" [Undecided,Triaged] 17:50:54 lol - I can knock that out tomorrow morning unless someone else wants it 17:51:01 been a while since I authored an OSSN 17:51:35 hmm 17:51:41 hyakuhei: cool. I'll try to get to one of the other ones once the embargoed one I'm working is wrapped up. 17:51:48 Cool 17:52:14 looks like a fun one 17:52:20 that's actually a cool bug 17:52:22 signature = rsa(sha256(md5(disk-image-content))) 17:52:22 This degrades the security of the system to that of the weakest hash, which is obviously MD5 here. 17:52:23 #action hyakuhei to pick up bug 1516031 17:52:23 bug 1516031 in Glance "Use of MD5 in OpenStack Glance image signature (CVE-2015-8234)" [Undecided,Triaged] https://launchpad.net/bugs/1516031 17:52:32 not super obvious from the code but it's true 17:52:37 That's about it on the OSSN side of things. Anyone interested can pick one of then up. :) 17:52:54 Thanks nkinder 17:53:47 tmcpeak: a collision on the md5 would ripple up through the sha and rsa? 17:54:10 you can just brute the md5 and then calculate sha256 of it 17:54:20 right 17:54:21 yeah, hash the same input and you get the same output 17:54:24 I'm not sure how the rsa fits in 17:54:27 *sigh* 17:54:30 lol 17:54:33 Righto, Any other business. 17:54:41 #topic Any Other Business 17:55:13 oh hi folks, if I may share another list of things to do... This is the list of public OSSA issues (confirmed and incomplete): https://bugs.launchpad.net/ossa/+bugs?field.information_type%3Alist=PUBLICSECURITY&orderby=-status&start=0 17:56:06 Are these where you need opinions from us? 17:56:26 well the two first one needs patch 17:57:27 the swift one needs opinion, investigation... 17:58:04 and the last one also requires some more investigation 17:58:10 Excellent, anyone want to take actions on these? 17:58:34 if they haven't been done by next week I should have some time to spend 17:58:50 I’ll try to do some on Monday. 17:59:02 to be honest, we figured those public ossa issue would be better discussed with OSSP 17:59:21 ok cool, Ill put it on my queue for Monday too 17:59:52 but times is now running out, so yes if they could get reviewed next time, that would be very helpful 18:00:07 ok cool, will do 18:00:23 time is up! 18:00:28 #endmeeting