18:00:16 #startmeeting OpenStack Security Group 18:00:17 Meeting started Thu May 16 18:00:16 2013 UTC. The chair is bdpayne. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:18 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:00:20 The meeting name has been set to 'openstack_security_group' 18:00:46 hi everyone 18:00:52 Greetings 18:00:53 Bryan Payne from Nebula here 18:00:57 who else do we have? 18:01:04 Greetings.. Basil from Red Hat. 18:01:27 Basil -- hope you did get some sleep! 18:01:46 A bit! 18:01:51 ha, nice 18:01:57 ok, we'll get started 18:02:02 I'm sure more will join as we go 18:02:10 #topic Doc Sprint 18:02:32 so we have dates locked in: June 24-28 18:02:41 * annegentle waves 18:02:41 we have a location locked in (near BWI) 18:02:49 hi annegentle 18:03:01 psyched for the doc sprint y'all! 18:03:23 and we have about 12 people committed to participating 18:04:05 noslzzp I'd like to explore getting a hotel block 18:04:24 and we have some logistics to work our regarding food and such 18:04:24 It's complicated. :) 18:04:30 complicated? 18:05:19 So, because we have a sponsor from the IC, the address is sensitive. 18:05:38 heh 18:05:49 The last meeting we had there, we didn't get final address details until late. 18:05:58 well, people will need to book a hotel, right? 18:06:11 I've asked Shawn to join here real quick. 18:06:17 noslzzp: i'm here 18:06:19 and we'd like to be as close to the site as possible… walking distance is ideal 18:07:12 who is "the IC" - I missed the last meeting 18:07:23 Ok.. So I've been the facility in mind. And it's walking distance from 2-3 hotels. 18:07:32 "IC" = intelligence community. 18:07:59 The location is very good for us. Good wifi, large room, quiet and decent restaurants. 18:08:10 could we still get a block at one of those hotels and not disclose the actual meeting location until last minute? 18:08:46 Give me 48 hours to get confirmation from our sponsor. I'd like to keep protocol in place. 18:09:04 fair enough 18:09:15 we can discuss offline once you know more noslzzp 18:09:23 Shawn is helping with the coordination. 18:09:45 #action noslzzp / swells to confirm our ability to setup hotel block 18:09:57 bdpayne, yes, offline as soon as we're fully cleared to share the address. 18:10:11 Sorry this is so complicated. :) 18:10:24 no problem 18:10:36 I used to live in that world, I understand at a deeper level than I care to admit 18:10:46 heh 18:11:19 ok, so bottom line here is that logistics are starting to come together 18:11:29 and we have a great team put together to do the guide 18:11:43 any other things to discuss regarding the doc sprint? 18:12:20 ok, we can move forward then 18:12:28 #topic Ongoing Security Projects 18:12:47 Anyone here that can provide an update on RPC security, key manager, and/or volume encryption work? 18:13:20 I can speak to the volume encryption work 18:13:30 Key manager: malini 18:13:45 joel-coffman let's start with you then 18:14:03 We expect to (re)submit our code in another couple of weeks 18:14:04 I know key manager is actively being developed - I'm on the github and see the commit/pull requests/etc. 18:14:26 We're working to incorporate changes requested at the summit 18:15:00 joel-coffman what can we expect from a functionality perspective from this new code submition? 18:15:44 The encryption part should be fully-functional 18:16:09 without integration into a key manager? 18:16:13 or with? 18:16:14 until the key manager is ready, I don't know how useful it will be in a deployed environment 18:16:27 right, ok 18:16:54 Key manager goal is to have enough in git by May 31 for joel-coffman to get a key and use 18:16:59 we aren't quite ready to integrate with the key manager yet 18:17:10 that timeline sounds about perfect 18:17:15 key manger will support "put" secret, "get" secret 18:17:37 joel-coffman if you put "SecurityImpact" in your git commit message for the PR, then it will automatically email the security list for review when your code goes up 18:17:50 May 31 is Havana-1 deadline, and July 18 havana-2, meeting 1&2 ensures incubation success 18:18:04 okay 18:18:32 sounds good, let us know if there's anything else the security group can do to help there 18:18:42 malini1 any other details on the key manager work? 18:18:59 I am working on keystone integration for key manager 18:19:11 and it is coming along 18:19:48 jarret from rackspace is working on a client, so slowly all the pieces are coming togeher 18:19:49 is the architecture / design of the key manager with regards to keystone available anyware? 18:20:18 yes, https://github.com/cloudkeep/barbican/wiki/_pages 18:20:36 Malini - when you say client - do you mean the JS client? 18:21:01 aka Palisade? 18:21:02 the only piece I am not too thrilled is that the rackspace design has a notion of "order", which is asynch to create a key 18:21:32 that fits in better for pki private/public and certificate, for a simple asymmetric key that feels like too much overhead 18:21:38 I suspect that if for SSL cert mgmt. That process has to be async if dealing with a third party CA 18:22:02 the alternative is for the service wanting a secret key to just create it and "put" it into keymanager 18:22:40 perhaps async is a reasonable first step? with an optimization available for symmetric keys down the road? 18:22:43 exactly, it is for ssl-cert management, but users such as cinder, swift etc are seeking symmetric keys 18:23:04 yes, would like support for pitching a fast-pass for symmetric keys 18:23:26 so is the key store creating the keys.. or just storing them? 18:23:40 having a fast-pass for symmetric would better support a use model where there is say and HSM to back the key manager 18:23:53 both models support, creating and storing 18:23:59 ok 18:24:12 because storing is supported, do not need to use the asynch path for symmetric keys 18:24:23 I am a short walk away from Jarret - I can talk to him about this. 18:24:26 personally, I like creating b/c I suspect that many users will make mistakes in trying to create keys 18:24:39 mtesauro that would be great 18:25:35 #action joel-coffman to aim for Havana-1 deadline for submission of volume encryption code 18:25:51 will do 18:26:03 #action mtesauro to discuss symmetric keys use case with Jarret, sync back with malini1 18:26:16 anything else to discuss? 18:26:58 ok then… thanks everyone for attending 18:27:03 I believe we are done for today 18:27:13 the point of creation needs to have a good supply of entropy for random numbers, so if the keymanager client has an api call for create key, that would work, most service endpoints for key creation will be on host machines 18:27:31 with the necessary entropy 18:28:07 thanks everyone 18:28:16 exactly… and then the key manager could get the entropy correctly 18:28:24 whereas the clients may not use a proper rng 18:28:29 which is a pretty common mistake 18:29:11 #endmeeting