15:00:37 #startmeeting security 15:00:38 Meeting started Thu Jul 11 15:00:37 2019 UTC and is due to finish in 60 minutes. The chair is gagehugo. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:39 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:42 The meeting name has been set to 'security' 15:01:21 o/ 15:02:05 i added a couple items of possible interest on the agenda 15:02:18 awesome 15:02:23 #topic Image Encryption popup team meeting 15:02:52 so image encryption meeting Monday @ 1300 UTC 15:03:05 oof 8am 15:04:08 for you anyway ;) 15:04:17 (that's 9am for me at the moment) 15:04:41 i also just now (well, in the past hour during the tc meeting) volunteered to be the tc liaison for that popup team 15:05:19 so hopefully i can remember to attend their meetings and keep the security sig abreast of the developments there 15:05:40 I'll attempt to attend then as well 15:06:01 #link http://lists.openstack.org/pipermail/openstack-discuss/2019-July/007617.html 15:06:12 #link http://eavesdrop.openstack.org/#Image_Encryption_Popup-Team_Meeting 15:07:59 ok 15:08:45 #topic Syntribos may still be in use? 15:09:08 #link https://review.opendev.org/#/c/670048/ 15:09:19 zte using it hmm 15:10:06 yeah, saw that "Fix client argument for neutronclient" change announced by gerritbot in #openstack-security and thought maybe there are still users after all, enough that they want to try and help fix problems on it still 15:10:30 I never heard anything back about it 15:10:36 we can leave it for now 15:10:52 it's *possible* this was just a maintenance change someone is mass-proposing to stuff that uses neutronclient, but that user has only previously contributed to rally 15:11:13 so it looks like it may be a genuine bug a user turned up and worked out the fix for 15:11:38 and, yeah, maybe this is someone who does qa work for zte 15:11:55 given rally and syntribos are both testing tools 15:12:47 yeah, good point 15:12:51 if we decide not to retire it, we maybe ought to reach out there and find out if they want to help maintain it 15:13:19 we could send out a mailing list email asking specifically if anyone still uses it? 15:13:27 (also we need to pin sphinx or switch to python3 so the docs jobs will pass, if we're keeping it around) 15:13:33 yeah 15:13:56 separate ml thread makes sense, sure 15:14:21 #action gagehugo to send out an email to the ml about syntribos usage 15:14:28 something scary enough to reach and rouse the handful of users out there, if they exist 15:14:46 [security] DELETING SYNTRIBOS NOW!!!!1! 15:14:54 theres lots of spider webs who wants to give it a sweep? :) 15:15:36 but yeah, ping out and hope someone notices 15:16:44 #topic Security guide update 15:16:51 nickthetait o/ 15:16:55 hey 15:17:11 so far I have read a significant portion of the docs 15:17:41 have a few questions on what is(n't) out of date 15:17:53 sure 15:17:59 openstack-announce email list has been shut down right? 15:19:21 nope, that still exists 15:19:33 ok, ez! 15:19:37 we do send major release announcements and security advisories there 15:19:50 CVSSv2 is referenced, should those be turned into v3? 15:20:14 what is the context? who is applying cvss scores to stuff? 15:20:21 1 sec 15:20:56 i think hyakuhei had ideas about the ossg doing cvss scoring of vulnerabilities in openstack and its dependencies once upon a time, but that didn't go anywhere that i can recall 15:21:51 it seemed like a nice idea to get some of the analysts around our community more involved with something that's in their wheelhouse, but ultimately most of the folks in the ossg were there to be able to say they were involved and really only showed up to meetings (if that) 15:22:13 #link https://docs.openstack.org/security-guide/management/continuous-systems-management.html#triage 15:22:34 there were rarely more than a handful of folks actually taking on work, and most of them weren't security analysts 15:23:14 sounds like not worth updating then? 15:23:58 Maybe not 15:23:59 hrm, in that specific context sure, doesn't hurt to say v3 instead 15:24:07 or just drop the version 15:24:13 sure, simplify it 15:24:39 reading through, it's saying that cvss doesn't accurately depict cloud vulnerability risks 15:24:55 not saying we apply cvss scoring to our vulnerabilities 15:25:18 so i think it's fine there, but can't hurt to generalize it slightly to save on future churn 15:25:39 is this statement still accurate? "very few clouds are using secure boot technologies in a production environment." 15:26:30 hmm 15:28:47 if it is too unclear, then we can just leave wording as is 15:29:14 Seems a bit generalizing, could just leave it yeah 15:29:58 ok 15:30:22 know what is up with this bibliography section? it seems out of place https://docs.openstack.org/security-guide/management/management-interfaces.html#bibliography 15:30:31 like it should be at bottom of the page? 15:31:49 i wouldn't be surprised that few clouds use secure boot, only because few servers use secure boot to this day, but i don't know that we should be asserting that without data to back it up 15:32:08 maybe that's my inner scientist 15:32:31 i just don't like baseless assertions in technical documents. it's editorializingh 15:32:43 but up to you realy 15:32:50 it's probably not "wrong" anyway 15:33:40 ok, will clean that up a little bit 15:34:09 i'd drop that "bibliography" section, sure 15:34:17 k 15:34:20 if for no other reason than because it links to a wiki article 15:34:28 ;) 15:34:50 if we need to call out things which were implemented in the liberty cycle, we should just say that instead 15:35:20 but in this case it's contextless 15:35:39 what part of the dashboard section was it relevant to? doesn't say 15:35:47 yeah exactly 15:35:59 it's just like... ohai, have a link to some releasenotes, kthxbai 15:36:20 not helpful 15:36:48 there is a big section on SSL/TLS, recommends only using v1.2, and yet 1.3 is now available https://docs.openstack.org/security-guide/secure-communication/introduction-to-ssl-and-tls.html#cryptographic-algorithms-cipher-modes-and-protocols 15:40:29 should say 1.2 or later hopefully 15:40:37 1.3 is still not widely deployed 15:40:45 true 15:40:56 * fungi was struggling to get apache working with 1.3 on debian/unstable just a few months ago even 15:44:24 so this claims keystone can't block after set number of failed logins https://docs.openstack.org/security-guide/identity/authentication.html#invalid-login-attempts 15:44:46 yeah that's been changed 15:44:54 it has that capability now 15:45:10 yay! 15:45:13 nice! 15:45:25 i'll get that fixed 15:45:25 should the document be updated to say what release that support was added in? 15:45:37 yeah lemme find a link 15:45:42 thx 15:45:42 I know it was newton though 15:45:47 (obviously it's still not available in the releases folks are running earlier than the one which added it) 15:45:48 (I helped with it partially) 15:45:57 :D 15:46:14 #link https://docs.openstack.org/keystone/latest/admin/configuration.html#security-compliance-and-pci-dss 15:46:29 having teh security guide be somewhat release-agnostic and provide guidance for folks who are running a variety of versions of openstack would be good, if we can manage to swing that 15:47:29 if only because we lack the people power to maintain per-release copies of the guide 15:47:43 yeah, will see how I can pull that off 15:48:02 so "go look at the rocky security guide because you're running rocky" isn't really a solution 15:48:32 "go look at the openstack security guide" and then it may say "if you're running rocky this can be done thusly..." 15:48:42 or whatever 15:49:23 "consider upgrading your deployment to rocky if you want to take advantage of this feature" 15:49:31 ^ 15:49:38 that sounds good 15:49:46 spitballing, but you get the idea 15:50:20 sorry nickthetait, I got another topic I wanna touch on while I got people here 15:50:32 no problem go for it 15:50:33 please do ask in openstack-security though if you have more questions 15:50:40 ok 15:50:53 I'm usually on all the time so I can typically respond 15:50:59 yeah, i have my irc client set to notify me if there's any activity at all in that channel too 15:51:00 and I believe fungi is as well :) 15:51:05 #topic Shanghai PTG Attendance 15:51:23 they sent out emails asking about attendance, are either of you planning on attending? 15:51:29 I will not be there unfortunately 15:51:40 if my visa is accepted, and barring no new natural disasters at home this year, i plan to attend the full week 15:51:53 i know for sure can't go 15:51:58 nice fungi :) 15:52:01 er, barring ANY new 15:52:33 in that case, i'm happy to be the standard bearer for the sig while i'm there 15:52:52 and will do my best to recruit a few new folks 15:53:11 fungi: up to you, I just wanted to ask now and not put it off until the last minute 15:53:18 yep 15:53:34 i don't think just me going is enough to warrant a room though 15:53:48 but i'll do my best to spread the word that we exist 15:53:49 yeah, I think that's more of what they're asking 15:53:53 do we want a room 15:54:34 lets follow up next week with this, and I can respond to the survey then 15:54:35 as usual i'd end up sprinting between other rooms most of the time anyway, so not much point in having a room with no security sig members in it 15:54:48 I'll ask in the ml as well, I see other teams doing that 15:54:51 ok 15:54:53 but yeah, maybe ask on the ml (in the weekly update?) 15:54:58 awesome 15:55:20 #action gagehugo to ask about the ptg in the ml 15:55:28 perhaps there are people who would show up and talk security who just aren't at our irc meetings 15:55:43 yeah, we had quite a few at the bof session in denver 15:56:10 #topic open discussion 15:56:15 anything else real quick? 15:56:34 "security is important" agree or disagree? :P 15:56:42 I'll try to send out the emails today, I'm going to be leaving on vacation tomorrow afternoon 15:56:51 so my productivity tomorrow will likely be approaching 0 15:57:03 have a great vacation! 15:57:13 my productivity usually hovers just above 0 anyway 15:57:15 yeah yeah have fun 15:57:21 going to float on a river over the weekend :) 15:57:30 nickthetait "agree" 15:57:39 don't forget your sunblock 15:57:44 yup 15:58:03 thanks for coming everyone, have a good weekend! 15:58:06 laters 15:58:06 #endmeeting