12:00:28 #startmeeting barbican 12:00:29 Meeting started Tue Jul 3 12:00:28 2018 UTC and is due to finish in 60 minutes. The chair is alee. Information about MeetBot at http://wiki.debian.org/MeetBot. 12:00:30 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 12:00:33 The meeting name has been set to 'barbican' 12:00:42 #topic roll call 12:01:19 anyone here -- I realize this is a big week for holidays .. 12:01:21 ? 12:01:23 o/ 12:01:26 o/ 12:01:36 hi Luzi mhen 12:02:17 we'll wait a couple of minutes for other folks to join .. 12:02:41 hi alee - is redrobot here today? 12:02:54 I think he's on PTO this week 12:03:02 (holiday) 12:03:33 given that tommorow is July 4th, many folks in the US are taking holidays 12:03:53 (I would be - but I've been on holiday for the last two weeks) 12:04:16 ah I see 12:04:34 ok - lets get started 12:05:01 I dont have much of an agenda this week. still getting caught up. 12:05:13 we're still marching on to get all the rocky features in 12:05:32 in particular the OVO feature 12:05:51 OVO? 12:06:00 I've done a ton of reviews and need other core (who are all on vacation) to do some as well 12:06:08 oslo versioned objects 12:06:16 ah I see 12:07:05 here is tracker page for rocky -- https://etherpad.openstack.org/p/barbican-tracker-rocky 12:07:37 in addition there is work ongoing to document policy in code and make some policy more consisitent 12:07:56 and some additional work to get the vault plugin tests running 12:08:44 not much more to report here except that there is a bunch to review and to do before rocky comes out 12:08:56 "SGX plugin" - sounds interesting 12:08:58 next milestone is week of July 23 12:09:14 is there any spec or PoC regarding that already? 12:09:34 mhen, yeah - the Intel folks worked on a plugin for SGX which they got working .. 12:09:47 and they wrote a whitepaper 12:09:58 some folks here have tried it out 12:10:03 do you happen to have any links to that? 12:10:05 let me get link .. 12:10:49 https://arxiv.org/abs/1712.07694 12:10:56 hey raildo 12:11:07 thank you very much 12:11:14 hey :) 12:11:21 hi raildo 12:11:35 https://github.com/cloud-security-research/sgx-kms/tree/master/Barbican 12:11:52 hello everyone! 12:12:11 welcome :) 12:12:14 they have some good work there including some barbican changes to do attestation 12:12:25 but have not tried to upstream any of it yet. 12:12:54 if anyone is interested in working on that -- that would be a great addition for Stein 12:13:22 no promises yet but it could be relevant for our project - we'll have a look at it 12:14:08 there is another company called Fortanix which has built a solution based on SGX, which has used the pkcs11 plugin to work with their solution 12:14:23 they are going to write a gate soon 12:14:32 mhen, that would be great 12:14:51 #topic summit 12:15:21 the deadline for submissions for the Berlin summit is fast approaching 12:15:27 July 13 IIRC 12:15:37 i thought 17 12:15:44 so any barbican related topics would be great .. 12:15:50 July 17th or am I wrong? 12:16:15 no I stand corrected 12:16:37 July 17th -- I think I was confused by some internal deadline here 12:16:55 anyone have any ideas of barbican related talks? 12:17:06 barbican/security? 12:17:57 * mhen shrugs 12:18:39 I'm probably going to propose something related to the vault backend work I've been wokring on 12:18:47 not fleshed out yet 12:19:06 alee, that would be awesome 12:19:34 raildo, I assume you'll be doing something about the oslo.config work? 12:20:17 alee, are you saying about proposing something to the Summit, or just about the development? 12:20:27 raildo, summit 12:20:37 (I know you're doing the development) 12:21:05 alee, well, probably, I'll skip this summit and maybe propose something for the next one, when we'll have some more mature 12:21:12 alee, using the castellan driver and so on 12:21:20 ok 12:21:33 well just to keep deadline in mind 12:21:40 I'd rather do something showing that working, than just "this is the next steps" 12:21:48 alee, sure, thanks! 12:21:48 ack 12:22:08 #topic castellan as base service 12:22:41 so for a long time, the TC has been pushing to have castellan added as a base service 12:22:51 and finally that change has merged .. 12:22:56 * alee finding review .. 12:22:57 yay 12:23:29 https://review.openstack.org/#/c/572656/ 12:24:21 so -- a castellan compatible service is now a base service - which means that developers should expect to use castellan to store secrets 12:24:56 hopefully this will drive the secure and centralized storage of secrets 12:25:05 either using vault or barbican 12:25:14 this is great news! 12:25:29 yeah - took forever to get there :) 12:25:52 #topic anything else? 12:26:00 o/ 12:26:30 there's also "PKCS#11 (against soft crypto)" on the etherpad you linked before - any details on that? 12:27:02 mhen, yeah - that was more aspirational -- nothing there 12:27:13 what does "soft crypto" mean actually? software-emulated HSM? 12:27:19 yup 12:27:23 I see 12:28:00 something like Utimaco's simulator? https://hsm.utimaco.com/downloads/utimaco-portal/hsm-simulator/ 12:28:06 or something more abstract? 12:28:15 yes - smething like that 12:28:40 but isn't PKCS11 already implemented? 12:29:04 mhen, yes - but the only tests for it have been against HSMs 12:29:24 mhen, and so there are no gates 12:29:52 mhen, it would be great to have a soft HSM gate -- also as an option for those who cant afford an HSM 12:30:01 I see 12:30:14 so we'd need a free HSM emulator/simulator I guess 12:30:17 of course, SGX fills that void too 12:30:45 right 12:31:07 and then we can create a gate job against that 12:31:50 mhen, PKCS11 is tricky -- every vendor has their own idiosyncracies 12:31:59 and then there are various versions 12:32:34 we had some patches submitted to update the pkcs11 version, but we unable to merge without good testing 12:33:47 mhen, Luzi - not sure if I've "met" you guys before. can you do a brief intro and explain your interest in barbican? 12:34:18 mhen and i actually sit next to each other 12:34:25 we work in the same team 12:34:32 that's right :) 12:34:56 i started attending this meeting 2 weeks ago, to discuss aes-xts bit lengths 12:35:27 Luzi, thats right -- I remember reviewing your patch the other day 12:35:30 we proposed a patch therefore, you already reviewed it. 12:35:49 cool 12:36:06 (I know you're name sounded familiar) 12:36:49 our team is working on SecuStack, a security-enhanced OpenStack 12:37:24 Luzi, I want to get feedback from redrobot and other folks on how best to fix the issue you raised 12:38:06 mhen, cool - so using barbican for things like volume encryption and imge signing and swift object encrytion ? 12:38:09 that's a good thing to hear 12:38:21 alee, exactly 12:38:44 also octavia stuff? 12:38:55 or magnum? 12:38:59 not yet 12:39:12 we're currently focusing on a minimal set of components 12:39:24 what backends are you guys looking at? 12:39:48 alee, are you referring to Barbican backends? 12:39:52 yup 12:40:11 (I know you guys have been looking at SimpleCrypto :)) 12:40:24 we're currently evaluating the usage of a HSM, specifically one from Safenet 12:40:55 great 12:40:56 but the SGX one sounds very interesting as well 12:41:11 this is worth checking out 12:41:44 definitely. 12:42:03 well good to meet you guys - welcome aboard! 12:42:16 thank you :) 12:42:22 thanks :) 12:42:27 anything else? 12:43:03 ok -- till next week then .. 12:43:11 #endmeeting