20:01:15 #startmeeting barbican 20:01:16 Meeting started Mon Oct 20 20:01:15 2014 UTC and is due to finish in 60 minutes. The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:01:17 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:01:19 The meeting name has been set to 'barbican' 20:01:49 Agenda can be found here: 20:01:51 #link https://wiki.openstack.org/wiki/Meetings/Barbican 20:01:55 #topic Roll Call 20:02:00 <( ^______^ )^ 20:02:06 o/ 20:02:08 o/ 20:02:11 _o/ 20:02:13 \o 20:02:14 0/ 20:02:20 o/ 20:02:25 o/ 20:02:29 o/ 20:02:42 o/ 20:02:58 Awesome, lots of barbicaneers here 20:03:11 so, we don't actually have anything on the agenda. 20:03:30 lol 20:03:52 I'm sure there's thing we want to talk about. 20:04:05 #topic Integration Patterns 20:04:23 rellerreller was talking about different patterns that other projects are using 20:04:27 last week 20:05:55 Integration for what? Using Barbican Keymat? 20:06:07 redrobot Giuseppe asked about Cinder integration. I responded to that email. 20:06:31 It's a slightly confusing landscape at the moment 20:06:36 So Barbican is trying to integrate with different projects. 20:06:43 so the question was if there's a need for a common interface to a key manager, for which barbican is one implementation. So other projects could use plugins to talk to other key systems directly. 20:07:11 Nova and Cinder both have a KeyManager abstraction in place. It is an abstract class. Barbican is one of the implementations of it. 20:07:38 would that code reside in its own repo, or part of the barb client repo? 20:07:38 In Neutron they talk directly to Barbican instead of going through the KeyManager interface. 20:07:55 ...that key manager facade that is 20:08:13 I would like to see it in Oslo 20:08:15 Iwould think that if we had a KeyManager, that it would reside in Oslo .. 20:08:23 makes sense 20:08:25 alee: +1 20:08:33 A few people have asked me about that recently 20:08:35 We tried to push it into Oslo 1-2 years ago but failed. 20:08:57 who would the review team be for a key manager library? 20:09:10 Isnt' that because oslo wants things to be established in projects first, then merged into oslo ? 20:09:18 ^ to stop endless library writing 20:09:25 hyakuhei correct 20:09:44 Seems like there's a better case for oslo now than 18 months ago then :) 20:09:50 But that is why it is annoying. We have duplicate code in Cinder and Nova 20:09:53 rellerreller, hyakuhei: would the barbican team be the primary reviewers for this new lib? 20:10:19 * hyakuhei shrugs - dunno. 20:10:22 dhellmann It would depend upon the implementation of the KeyManager. 20:10:32 woodster_, redrobot ^^ 20:10:41 you might do just as well to create a library owned by the barbican team,then 20:11:03 oslo isn't the only place we can create libraries, so we try to find other homes if there is an obvious review team in another program 20:11:24 I can help you get set up with what you'd need, if you like. 20:11:32 dhellman Is there an example of another library like this? 20:11:40 rellerreller: keystone owns pycadf now 20:11:56 So obviously oslo is the preferred / good neighbour way of doing things .... 20:12:01 rellerreller, the abstract classes in nova and cinder are integration points for Barbican ? 20:12:14 there's some discussion of a similar case for the policy library, but that doesn't really exist yet 20:12:15 atiwari yes 20:12:38 rellerreller, are there non-barbican implementations of the key manager interface now? 20:12:42 that mean these projects are integrated ? 20:12:44 rellerreller: I'm not saying we wouldn't take it in oslo, but if the review team would mostly be barbican devs anyway then there may not be much point 20:13:21 woodster_ There is a testing KeyManager interface that simply returns the same key every time. We also had a DBKeyManager at one point as well. Again just for testing purposes. 20:13:44 dhellmann: We can get non Babrican devs from OSSG to review. 20:13:51 (Not a bad idea in any event actually) 20:14:22 I have no preference for oslo particularly, just thinking that makes sense from an integration pov. 20:14:31 dhellmann, if barbican owns that interface then would barbican also need to be integrated for other projects to use it, even for non-barbican purposes? If the key manager interface usages now are pending barbican integration anyway, not really an issue? 20:15:08 woodster_: if the library allows alternate implementations (drivers?), then the library could be used without the barbican service being required 20:15:11 just trying to understand how this would fit into global requirements for projects 20:15:47 It's kind of hard to work out where support for Barbican is and isn't right now. tkelsey put together a wikipage that attempts to ssummarize where things are at. It could probably do with a review/edit from some of you guys: https://wiki.openstack.org/w/index.php?title=EncryptionInOpenstack 20:16:28 rellerreller, i see there are no impl. yet. 20:16:32 hyakuhei: yeah it needs a lot of input, but may help build an overview 20:16:57 Would be useful to direct people to, like that ML query regarding cinder support 20:17:16 hyakuhei: +1 yeah good point 20:17:22 tkelsey We can take a look at that. bpoulos did a lot of work there. 20:17:25 dhellmann, so could this key manager facade be a library in a new repo, but under the key manager program (for review purposes) perhaps? Just trying to fit the puzzle pieces together in my head :) 20:17:31 I like the idea of having a separate lib for the key manager interface... would this be an oslo* lib though? 20:17:52 atiwari check out the Cinder project. cinder.keymgr.barbican.py. 20:18:12 woodster_: yes, you would want a new repository with just the library 20:18:18 atiwari: https://github.com/openstack/cinder/blob/master/cinder/keymgr/barbican.py 20:18:43 rellerreller, got it I was looking in to Nova 20:18:46 thanks 20:18:58 dhellmann, ok that makes sense then. A lightweight focused repo for that feature, with barbican as an optional plugin/driver to it. 20:19:08 redrobot: my suggestion right now is to have the barbican team manage the new library, since you already have an experienced review team to work on it. We could, bring some oslo folks in to give advice on the API, if you want, but we don't have to own everything that is shared. :-) 20:19:15 woodster_: exactly 20:19:21 Yes, Nova is still pending review. They would like to see Barbican integrated first. 20:19:33 But we are still pushing on them to get it accepted. 20:20:17 dhellmann, redrobot, woodster_, sounds good to me! 20:20:20 dhellman Interesting. So we would not look unfriendly by starting a new repo? 20:20:25 rellerreller, yes that was my concern about having barbican as a dependency for the facade...chickens & eggs! But a separate focused lib would break that condition I'd say 20:21:07 woodster_ Yes. I think a separate library opens up a lot more possibilities and will make it faster to integrate. 20:21:31 rellerreller, for sure. 20:21:41 dhellmann Interesting. So we would not look unfriendly by starting a new repo? 20:21:45 rellerreller: not at all 20:21:52 so would this be a new stackforge repo perhaps then? 20:22:26 That makes me feel better. I would hate to make the community upset, especially at the critical moment when we are trying to integrate. 20:22:42 woodster_: you're an incubated project, right? I think you can make this under openstack/ 20:23:33 rellerreller: I'll back you on creating the new repo for the new lib, as long as the lib supports at least one driver other than barbican just in case someone doesn't want to deploy barbican 20:24:19 Direct KMIP or somethign I suppose? 20:24:47 dhellmann, would it need a barbican- prefix to it though, or just declaring it as part of the key manager program would be enough? Could be as simple as 'keymanager' as the repo/lib name? :) 20:24:49 hyakuhei You could do that but KMIP does not support Keystone token authentication yet 20:25:23 I'm not sure what a non-Barbican driver would look like? 20:25:35 redrobot, woodster_ rellerreller One more integration question, Keystone credential API. Is it make sense to proxy credentials to Barbican; to store the actual secret blob? 20:25:35 All the secrets would not be validated, which is why we have KMIP under Barbican now. 20:25:38 woodster_: you don't need to put barbican in the name, but "keymanager" may be a little too generic. 20:26:15 hyakuhei: I'm not sure, either, but until we're certain the other projects want to rely on barbican I think you need some alternative to gain acceptance of the library 20:26:41 hyakuhei: maybe a direct database driver? 20:26:47 That's fair enough, just wanted to make sure I understood 20:27:02 well, designing the key manager interface would be nice for Paris. Maybe a Keystone integrated mode would be optional, for projects with their own (non-Keystone auth) implementations? Paris would see like a good place to define and launch this lib then? 20:27:23 Good place to start I imagine 20:27:27 woodster_ +1 yeah, I think we definitely need to talk about this. 20:27:27 woodster_ +1 20:27:28 +1 20:27:35 +1 20:27:51 +1 (will there be a livestream?) 20:28:29 redrobot, woodster_ rellerreller did you see my question above? 20:28:35 rm_work not sure yet about the livestream. 20:28:57 atiwari: I do not understand the question. 20:29:42 Adding as a topic to the kilo design summit etherpad: https://etherpad.openstack.org/p/barbican-kilo-design-sessions 20:29:53 (#15...a long list out there) 20:29:57 rellerreller, keystone define an ad-hoc strategy to store use credential. 20:30:01 #link https://github.com/openstack/identity-api/blob/master/v3/src/markdown/identity-api-v3.md#credentials-v3credentials 20:30:15 woodster_ I think this would fall under integration with other projects as well 20:30:17 wondering is it make sense to move that in Barbican 20:30:48 keeping the keystone credential API intact 20:30:50 rellerreller, good point...will add to the 0-th item there! 20:31:13 atiwari: I will have to look at the link and get back to you. I"m not familiar with that. 20:31:52 rellerreller, may be good to talk in Paris :) 20:32:04 atiwari, meaning storing the credential of the user that stored the secret ? 20:32:26 atiwari, sounds good 20:32:34 alee, no it can be anything but scoped to user 20:34:29 atiwari, ok - I'm not sure where you are going with this. will have to read and we can discuss in paris. 20:34:45 atiwari, maybe file a spec .. 20:34:53 alee sure 20:34:53 or blueprint 20:34:57 atiwari, isn't this item #12 on the etherpad: https://etherpad.openstack.org/p/barbican-kilo-design-sessions 20:35:15 ...or related to it? 20:35:28 woodster_, it is in etherpad at last 20:35:41 Misc 20:37:37 #agreed we'll discuss a generic key manager interface library that projects can use to integrate. 20:37:56 do we have any other topics we need to talk about? 20:38:08 redrobot, woodster_, rellerreller alee any thoughts on "Generation discovery API" 20:38:09 ? 20:38:14 I'd like to discuss HSMs and key handling 20:38:34 tkelsey has been working on this: https://review.openstack.org/#/c/116878/ 20:38:42 I would like to chat a bit about this patch https://review.openstack.org/#/c/116878 20:38:46 #topic HSMs and Key handling 20:38:47 Which has some interesting reviews. 20:38:51 this is for "How should we handle secret_store.py plugin validation" 20:39:22 hyakuhei go ahead 20:39:32 Basically is having a HSM but handling keyunwrapping inside Barbican allowable. 20:39:57 We're working on KMIP support that will deprecate the work tkelsey has been doing 20:40:33 My understanding is that the preferred mode of operation is for HSM to handle KEK internally and perform wrapping etc 20:40:47 With some HSM interfaces that isn't possible. 20:41:03 The ESKM only supports that through KMIP (It's _very_ KMIP complient) 20:41:15 yeah KMIP is the way we are heading, however it would be good to know about the key (un)wrapping question 20:41:26 We (hp) are supporting APL with the KMIP work and setup a bunch of testing/validation systems for that 20:41:36 hyakuhei, would you KMIP work deprecate tkelsey's work soon, or in the longer term? 20:41:56 I'd say medium term, 1-2 cycles 20:42:23 but we want to use HSMs in high assurance environments sooner than that, without forking/doing or own addon stuff. 20:42:35 We'd rather contribute 20:42:45 I noticed Robert's comments out there since I put mine out there. I'd like for reaperhulk to weigh in as well. 20:43:18 woodster_: you make good points 20:43:19 woodster_: I guess some of the time line depends on how soon KMIP is added to the official deps set https://review.openstack.org/#/c/114037/ 20:43:31 but I don't think security is an absolute, there are shades :) 20:44:04 hyakuhei: +1 20:44:52 the arguments seemed reasonable to me, esp. if KMIP is a little ways off. I'll see if I can get reaperhulk's thoughts add to that CR though.... 20:45:13 hyakuhei: Are you looking to store KEKs in KMIP device and then encrypt/decrypt DEKs in Barbican? 20:45:15 +1 value his input 20:45:33 woodster_: thanks, input always good! 20:46:04 rellerreller: Yes, for this plugin we'd have to do wrapping in the barbican process although steps can be taken to make the KEK as short-lived as possible 20:46:32 Basically we can't do it as an internal operation to the HSM without KMIP 20:47:21 We're investing time in both as you know but we'd like to get this in first as we have some deployments that can immediately leverage it and various customer types waiting for it 20:47:44 so the main question on the review page is about how the KEK is retrieved. We need to do the DEK unwrapping locally and request the KEK from the HSM on demand only when needed. 20:49:14 this has some security implications, though its better than a local KEK and no HSM. Its a sort of half way solution until we can have KMIP 20:49:30 I'd also be interested in smart ideas around how to make the KEK as short-lived as possible / smart ways to purge it (given pythons various magics) 20:49:50 hyakuhei: +1 yeah that would be very interesting 20:51:29 I don't understand "until we can have KMIP." What happens then? 20:51:52 rellerreller: Our preferred way to interact with any HSM would be KMIP 20:52:04 rellerreller: well the idea is that once we use KMIP to communicate with the HSM then we have more options 20:52:17 Which, from what I undertand, would allow us to offload keywrapping to the HSM completely 20:52:21 hyakuhei, so there isn't a PKCS11 sort of interface for it, correct? That's what we use with SafeNet 20:52:29 But KMIP does not have encrypt/decrypt functionality as far as I know. 20:52:36 tkelsey: ? 20:54:05 I'll have to get back to you on PKCS11 20:54:18 but being slightly more abstract 20:54:55 I suppose the main difference is the level of Barbican comrpomise required to access DEKs 20:55:14 We're running short on time, but yeah it will definitely be interesting to discuss this at the summit. 20:55:19 tkelsey, hyakuhei, just trying to understand DEK vs KEK above...is DEK the secret you are encrypting with the KEK? 20:55:32 so, before we run out of time: python-barbicanclient 3.0 -- any idea about a release date/cutoff? I think most of the major things have merged now, right? Is the keystone session rewrite the last one that's waiting to merge? 20:55:34 In the case of on-HSM wrapping, execution would be required inside Barbican to send/receive DEKs to the HSM. 20:55:49 rm_work and orders... gotta get typed orders finished. 20:55:59 redrobot: ah, typed orders are in 3.0? 20:56:03 woodster_: yes thats right 20:56:06 thought maybe those would be for 3.1 20:56:33 more discussion required I guess, thanks for the discussion guys 20:56:35 rm_work current orders don't work with Juno Final :( 20:56:35 woodster_: the KEK is used to encrypt the DEK, the DEK is stored locally in Barbican, the KEK is pulled form the HSM on demand 20:56:41 so if you've got to finish coding that still, I'm guessing chances of getting it out before the end of the week are slim 20:57:14 redrobot: let me know if you have any questions about decisions I made while doing typed containers <_< 20:57:22 rm_work yeah, end of week would be awesome, but we need mroe reviewers 20:57:39 well, all I can give you is eyes and a +1, but let me know when it's up 20:57:46 redrobot, and you thought we had nothing to talk about an hour ago! 20:58:26 woodster_ hehe, yeah. 20:58:36 Everyon please feel free to add to the agenda on the wiki. 20:58:43 tkelsey, and when you "have KMIP", you'll be able to make an api call that does the decryption of the DEK on the HSM? 20:59:35 #endmeeting