20:00:42 #startmeeting barbican 20:00:43 Meeting started Mon Aug 10 20:00:42 2015 UTC and is due to finish in 60 minutes. The chair is redrobot. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:00:44 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 20:00:46 The meeting name has been set to 'barbican' 20:00:55 #topic Roll Call 20:01:01 o/ 20:01:03 ヽ(⌐■_■)ノ♪♬ 20:01:04 o/ 20:01:08 \o/ 20:01:09 o/ 20:01:10 o/ 20:01:18 o/ 20:01:29 (ノ´ヮ´)ノ*:・゚✧ 20:01:32 o/ 20:01:37 elmiko, lmao <3 20:01:39 o/ 20:01:48 o/ 20:01:49 chellygel, totally inspired by you =) 20:02:13 lol 20:02:17 heh 20:02:25 awesome, lots of barbicaneers here today 20:02:41 #topic Review Action Items from last meeting 20:02:42 #link http://eavesdrop.openstack.org/meetings/barbican/2015/barbican.2015-08-03-20.00.html 20:03:06 looks like that redrobot guy had a lot to do... and didn't do any of it... 20:03:25 in my defense we did have a mid-cycle since last week 20:03:35 o/ 20:03:45 so I'll be doing those things this week 20:03:51 redrobot to finish prioritizing liberty-2 bugs, and also check them for kilo status 20:03:54 #action redrobot to finish prioritizing liberty-2 bugs, and also check them for kilo status 20:04:01 #action redrobot to fix the stable/kilo gate failures during mid-cycle 20:04:27 ^^ regarding the broken gate, I'll actually be looking into that right after the meeting 20:04:32 Do we have any new action items to add based on the midcycle? 20:04:45 #action redrobot and alee to backport the DogTag gate fixes into stable/kilo after redrobot fixes the gate 20:04:54 pkazmir good question 20:05:15 pkazmir I'll cover action items from the mid-cycle next 20:05:20 o/ 20:05:20 k 20:05:34 ok, moving on to the actual agenda 20:05:58 which we don't have anything on this time around... so I'll be making up topics as we go 20:06:05 #topic Mid-Cycle Sprint Recap 20:06:16 We had our mid cycle last week 20:06:33 many thanks again to the JHAPL folks! 20:06:37 it was a great success 20:06:41 #link https://etherpad.openstack.org/p/barbican-liberty-midcycle 20:06:43 +1000 20:07:09 Glad everyone enjoyed it :) 20:07:11 we have a lot of action items that came out of the discussions. The've all been captured in the etherpad 20:07:38 awesome job rellerreller and kfarr - especially thanks for arranging cool weather for us Texans! 20:07:48 impressive etherpad, well done all 20:08:04 I'll be reviewing the etherpad in the next few days and emailing everyone who signed up for action items, so you don't have to dig through the whole thing to figure out what you signed up for. 20:08:11 346520 20:08:29 elmiko we had an awesome note-taker 20:08:41 rellerreller, +1000 for pluto tour .its going to hard to top that .. 20:08:50 ^ 20:08:52 redrobot, well, get that person an extra helping of "hell yeah" ;) 20:09:06 elmiko hehe, will do! 20:09:48 As far as this cycle is concerned, we did not add any blueprint exceptions, so all pending blueprints should be moved to a new M directory 20:10:03 * redrobot tries to remember what M is called...? 20:10:15 Mitaka?? 20:11:20 silos1 I think you may be right... 20:11:51 on the Castellan front, we reviewed some of the pending CRs and will be doing just a little more work on those before we land them 20:12:07 Working on them now! 20:12:07 rellerreller i think we're going to use bytes instead of bytearrays? 20:12:16 redrobot yes 20:12:51 Removing get_format and changing get_encoded to take an optional format parameter 20:13:03 I don't think format needs to be removed? 20:13:29 rellerreller kfarr correct... I think it's still valuable to keep a format property around to know what the current format of the secret is 20:13:41 If can call get_encoded to return in different formats then I do not think it is needed. 20:14:03 but format is things like "PKCS#8" and "X.509" 20:14:20 and get_encoded will take parameters like "DER" vs "PEM" 20:14:27 Right those would be passed to get_encoded. 20:14:28 or am I misunderstanding :( :( 20:14:49 Always returning DER because API says returns bytes 20:15:15 hmm.... I think kfarr makes a good point... 20:15:33 I think maybe to unblock these, we can keep format for now, and then add the optional parameter later 20:15:54 for now get_encoded wouldn't take any parameters and return the DER of whatever format the secret is in 20:15:59 OK :) 20:16:13 we can then discuss whether format and encoding need to be two separate things 20:16:17 ie, 20:16:27 get_encoded(format='pkcs8', encoding='der') 20:16:52 just glad this isn't a content-types discussion 20:16:52 rellerreller sound good to you? 20:17:18 woodster_ only mildly related... once we nail this we'd have ammo for exactly which content types we need ;) 20:17:26 OK, so keep get_format and get_encoded does not take any arguments. I'm ok with that. 20:17:43 rellerreller well, rename get_format to just format, but yes 20:17:55 OK, sounds good to me 20:18:14 That means https://review.openstack.org/#/c/191884/11 is already good to go! 20:18:23 #agreed move forward with format and no arguments to get_encoded in current castellan CRs 20:18:37 kfarr woot! I'll review it after the meeting. 20:19:36 another important topic to come out of the mid-cycle is the need to simply deployment 20:19:48 and the eventual split of barbican-kms and barbican-cms 20:20:17 the problem now is that someone who wants to deploy Barbican has to figure out both the secure storage part, as well as flesh out a Certificate Authority story 20:20:51 as we look forward to Federation of Barbican secrets, then forcing everyone to stand up CA to deploy Barbican seems to be very burdensome 20:20:58 especially if all you want is to federate secrets 20:21:42 so we'll start having v2 conversations in the next summit, to separate the api for KMS from the api to do Cert management. 20:23:08 any questions, or other highlights from the midcycle worth mentioning? 20:24:08 redrobot, is there going to be a blueprint/spec for the v2 specification? 20:24:18 Barbican federation is on the horizon 20:24:32 redrobot, or are we just leaving it to etherpads for now? 20:24:43 alee yes, jvrbanac took the action item to put up a spec to the spec repo 20:24:44 redrobot: if cert generation was included in the Castellan interface, the split would be easy <_< 20:24:57 redrobot: because you could just switch from using a barbican impl to a "whatever else" impl 20:24:57 lol 20:25:18 rm_work I think the idea is for Castellan to only provide KMS features 20:25:23 * rm_work is still a little annoyed at not even getting so much as a ping when that discussion happened 20:25:52 redrobot, jvrbanac - I'm assuming that migration will be a part of that spec 20:26:18 redrobot: would you help me set up the infrastructure (repo, pypi, etc) for castellan-certs ? 20:26:52 redrobot: it's probably going to have to happen, at this point i really just don't have experience with setting that stuff up and it's the major blocker for me as i'm low on time 20:27:23 rm_work we can talk about that as a topic later this meeting if you'd like. 20:27:28 kk 20:27:53 alee yeah, migration, or rather v1 deprecation plans would have to be part of the spec 20:28:32 redrobot, we didn't decide on who would do the spec yet 20:28:44 jvrbanac I do believe Lisa signed you up for that 20:29:19 jvrbanac I'll double check my notes though. 20:29:59 redrobot, it was to start an etherpad 20:30:29 jvrbanac we did have a conversation about an etherpad being way too messy for this process.... I think it would be best to have a spec 20:30:39 redrobot, jvrbanac it would be awfully nice to have something to chew on by the time the summit comes around - some of these conversations are more easily accomplished face to face. 20:31:03 assuming of course that most folks will be at the summit -- which is perhaps not a good thing to assume 20:31:40 jvrbanac though now that I think of it, it may just have been a conversation between me and Lisa.... so yeah, a Spec would be much nicer I think. 20:34:37 ok, sounds like we don't have any more highlights and/or questions about the mid-cycle 20:34:41 moving on 20:34:45 #topic Castellan for certs 20:35:09 So, I have said this before, and I'll say it again -- I feel like I'm taking crazy pills here 20:35:27 the "lack of use cases" statement is astoundingly ignorant 20:35:28 Step 1 is admitting you have a problem :) 20:35:33 jk!!! 20:35:35 lol 20:35:36 and if i seem a little frustrated, it's because i am a little frustrated 20:35:45 sorry, very frustrated 20:35:58 i am thinking maybe i made this into too much of a joke or something earlier 20:36:20 so, fundamentally, Castellan is providing an interface for secret storage so that a project is not tied to Barbican and can use something else instead. 20:36:30 yes 20:36:36 so, for secret storage 20:36:46 it was SUPPOSED to be "Secret and Certificate storage" 20:36:47 which 20:36:47 that something else could be a KMIP device, or a PKCS#11 device. 20:36:54 rm_work: it does seem like the stovepiped code for your use case should find a home someplace 20:37:17 had i been more vigilant when we were making this spec to begin with, would have noticed the wording was changed from what we originally discussed verbally 20:37:22 well, as woodster_ would say "The Devil is in the details" 20:37:25 but that's old news 20:37:47 the thing is you don't just want to store a cert 20:37:53 and i have proven several times, i thought, that i could store whatever i want, including cert constructs, in whatever device i was presented 20:38:25 you want to store a cert in addition to it's private key and public ca cert, intermediates and possibly a passphrase as a single bundle 20:38:38 there's also nothing that says that every implementation has to exist for every interface 20:38:44 i think maybe that is a misunderstanding 20:38:54 obviously there wouldn't be an anchor driver for secret storage... 20:39:05 just like maybe there wouldn't be a barbican driver for cert generation 20:39:38 though they could make use of each other internally (as I have gone over on whiteboards with woodster_ previously) 20:39:41 then what's the benefit of a lowest common denominator interface, if there's no guarantee that what you put behind it will actually do all the things it needs to do? 20:39:58 they weren't designed to be the same thing 20:40:18 Castellan would have options for which impl would be used for each piece 20:40:40 if you ever looked at the existing code that I proposed for castellan-certs, it already did that for generation vs. storage 20:40:47 why can't castellan have a castellan.cert_manager akin to castellan.key_manager? the api_class would be different for both modules? 20:40:59 exactly this ^^ 20:41:17 (also enjoys crazy pills) 20:41:19 ;) 20:41:21 there is a cert_manager_impl defined, and a key_manager_impl, and a cert_generator_impl 20:41:30 you can mix and match 20:41:46 and they can use each other ALSO at the abstract level 20:41:49 What's the difference between cert_manager_impl and key_manager_impl ? 20:42:11 I think that this discussion boils down to this question: 20:42:17 cert_manager_impl could use certmonger which could turn back around and use key_manager_impl 20:42:24 if it wanted to 20:42:42 but probably cert_manager_impl would *use* key_manager_impl 20:42:43 why do you want to store a cert bundle as a single thing, instead of using castellan.key_manager to store the different pieces? 20:43:37 I understand the barbican use case that an OpenStack user can upload a cert-container and just pass a single reference to lbass, instead of 3 (or 4) references to the separate things 20:43:51 well, my original plan was to use cert_generator_impl and key_manager_impl and include the cert functions in there, but as you pointed out, there was pushback to that 20:44:11 there's push back to bundling a certificate 20:44:27 I think we all agreed that a cert, by itself, could be one of the managed objects in castellan 20:44:37 so you disagree at a very high level that Openstack should not have the concept of a Certificate bundle? 20:44:56 is that what's really at issue? 20:45:20 if that's the problem, then we disagree *fundamentally* 20:45:24 that's the argument against putting a bundle in castellan... because the only system we know that can bundle certs like that is Barbican 20:45:25 and this is a bigger problem than I thought :/ 20:45:33 redrobot: ANY SYSTEM CAN BUNDLE CERTS 20:45:40 i don't know how many hundreds of times i have to explain that 20:45:56 I could bundle certs in pure KMIP 20:46:00 I could bundle certs in LDAP 20:46:24 rm_work, how would you bundle certs in KMIP? 20:46:59 there are a couple of options 20:47:04 I've been thinking the cert manager would support storing a bundled cert into key storage, perhaps without the key storage knowing (or caring) it was storing such a bundle 20:47:11 ^^ this 20:47:40 the naive approach is to literally tack them on to each other in a predefined order and store them all together 20:48:05 I've been thinking this functionality would be more of a support/utility feature set in addition to castellan 20:48:07 another naive approach is to store them all as seperate entities and then store a "container secret" with references to all of the other ones, using JSON or something 20:48:23 and then the reference to that is the "cert bundle" 20:48:42 or PKCS12 if KMIP supports complex structures (though I don't think it does?) 20:49:17 I don't think it does in 1.2 20:49:19 "A KMIP server stores and controls Managed Objects such as Symmetric and Asymmetric keys, Certificates, and user defined objects." 20:49:24 the key here being "user defined objects" 20:50:03 if I can store whatever I want, then it is *trivial* to store a cert bundle 20:50:33 rm_work, is castellan cert manager supposed to generate certs or just provide cert storage parts? Is it expected to integrate with barbican, considering its not synchronous flow? 20:50:46 arunkant: i was proposing TWO interfaces, cert_manager and cert_generator 20:51:27 it could integrate with barbican or not, but it wouldn't matter, as cert_generator would utilize cert_manager for storage, and cert_manager could utilize key_manager for storage if it wanted to 20:51:45 or it could be done all independently... totally up to the implementation 20:51:50 rm_work, okay..so cert_generator will talk to Barbican then for cert generation? 20:52:00 if you used that implementation 20:52:10 or it could talk to Anchor, or certmonger, or dogtag directly 20:52:53 the only issue is that I will fully admit this ventures into the territory of "becoming a cert manager akin to what barbican was doing in the first place" 20:52:54 rm_work: just curious, is the code that has been copy/pasta-ed into the various projects changed much from the original castellan CR you had up? 20:53:03 rm_work, but that impl will be quite different from certmonger as barbican's async behavior 20:53:05 it has evolved a little bit 20:53:16 arunkant: yeah, so that is one issue -- is it sync or async 20:53:26 and is sync even feasible for anything but anchor 20:53:52 probably not... any real CA is going to have some process for an RA to approve/deny cert requests. 20:54:09 woodster_: the two repos the code exists in now have actually diverged a bit, which is not great -- that's another motivator for me to get it centralized ASAP 20:54:43 redrobot: cert_generator by far poses the greatest issue, and it's possible that cert_generator might just be whatever new project Barbican splits cert_generation into 20:55:04 cert_manager though seems like a braindead simple decision to include though 20:55:17 we're running out of time for today 20:55:20 s/though// 20:55:24 and I don't think rellerreller is still around 20:55:34 well, async can be brute-force turned into a sync. Dogtag directly could support sync as well. 20:55:57 i think everyone is paralyzed in fear that including a cert interface would somehow jeapardize the integrity of the existing key interface, and i just don't think that's the case 20:56:02 so I don't want to make a decision now... rm_work will you be available to continue this as the first topic next week? 20:56:04 so would a separate project to hold the cert stuff answer the need here? 20:56:05 woodster_: yeah i was going to mention that but it's ugly 20:56:10 redrobot: yes probably 20:56:24 woodster_: ^^ the async->sync thing 20:56:36 rm_work k, let's punt to next week though and get feedback from rellerreller about a possible cert_manager in a separate namespace. 20:56:41 that actually IS the current solution -- polling, in the case of Barbican 20:56:43 rm_work, do you have this written up somewhere? 20:56:51 kfarr: i have code implemented >_> 20:56:57 do we need (dare I say it) an etherpad for this? :) 20:57:08 that is in use by two projects already 20:57:13 and has been for about 8 months 20:57:22 key manager, cert manager, cert generator? 20:57:26 the latter two 20:57:33 which are modeled directly from cinder's key manager 20:57:42 with the explicit intention of coexisting 20:57:48 (Don't pull a Woody!) 20:57:59 pkazmir: ha! 20:58:28 things have changed a bit, and a lot of my motivation to see all your CRs land for Castellan was so I could finally get to work updating them 20:58:42 and actually make something that could be submitted to the current Castellan landscape 20:58:52 kfarr: ^^ 20:58:56 rm_work, I understand what you are trying to do - we also need to consider how this affects plans for migration to v2 20:59:09 alee: i think it couldn't possible hinder migration 20:59:22 and in fact it seems that it would actually open up easy avenues for migration 20:59:27 alee: I'd think it is just which endpoints you hit under the hood (for the KMS/CMS servers that is) 20:59:27 rm_work let's plan on getting kfarr's crs landed this week so you can have a CR up for discussion next week. 20:59:32 redrobot: kk 20:59:42 Please review this quota support CR: https://review.openstack.org/#/c/205894/ it's the foundation for the rest of the quotas code, so I'd like to get it stable ASAP to make sure the full blueprint is implemented in Liberty. 20:59:45 alright guys, we're out of time here 20:59:48 thanks for coming! 20:59:49 if the discussion is monday, that'll be cutting it close if we don't merge those SOON :P 20:59:54 woodster_, yes and no -- in v2 we're talking about eliminating cert containers 21:00:02 #endmeeting