18:00:15 #startmeeting OpenStack Security Group 18:00:16 Meeting started Thu Jul 11 18:00:15 2013 UTC. The chair is bdpayne. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:17 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:00:19 The meeting name has been set to 'openstack_security_group' 18:00:29 good morning security group 18:00:40 Good evening :-) 18:00:45 :-) 18:01:02 we've taken a few weeks off here, and I'm hoping to ramp things up again 18:01:10 so lots to discuss today 18:01:21 first, who do we have in the meeting? 18:01:30 Bryan from Nebula here 18:01:31 Good Afternoon 18:01:36 Randy Perryman from Dell 18:02:04 hi randy 18:02:08 Nicolae, sics 18:02:29 ok, great 18:02:37 I'm sure others will join in as we go along too 18:02:43 #topic Annoucements 18:03:16 First, I wanted to make sure that everyone is aware of the mailing list 18:03:17 http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security 18:03:45 This is where security related announcements go, along with notifications about OpenStack bugs that need security team review 18:04:00 also a fine place for security discussion 18:04:12 I'd encourage everyone in OSSG to join that list 18:04:58 Also, Rob put together the initial pieces for a security wiki web page 18:04:59 https://wiki.openstack.org/wiki/Security 18:05:14 ty 18:05:34 I'd like to build this out to be a nice landing page for people interested in openstack security 18:06:00 and then perhaps have a subpage that is full of suggestions for people wanted to get involved in OSSG 18:06:17 nicolae__ said he could help with this 18:06:20 right? :-) 18:07:06 #action nicolae__ to help fill out the wiki pages 18:07:07 Right :) 18:07:34 #topic Security Guide 18:08:03 If you haven't heard the news yet, the security guide book sprint was a big success 18:08:05 http://docs.openstack.org/sec/ 18:08:28 We'll be getting a pdf and html up there shortly 18:08:39 thanks 18:08:48 I just saw this and now to read... 18:08:53 This was really a huge effort by a great team of people 18:09:00 I think it's a great first cut 18:09:08 But there's plenty of places where it can be improved 18:09:28 So I would encourage others to contribute back to the guide… anything from grammatical edits to new chapters 18:09:30 https://github.com/openstack/openstack-manuals/tree/master/doc/src/docbkx/openstack-security-guide 18:09:49 ^^ The book is in docbook source and held in that github repo ^^ 18:09:50 bdpayne: Error: "^" is not a valid command. 18:09:59 sorry about that bot 18:10:23 any questions about the book? 18:11:32 ok, I'll push ahead 18:11:44 #topic Reviewing open security issues 18:11:56 So there's a lot of code that needs security reviews 18:12:06 The mailing list is a great way to get plugged into this 18:12:43 But I wanted to call to the attention of the group here some specific itema 18:12:49 s/itema/items/ 18:13:08 the APL team (who couldn't make the meeting today) have done a lot of work on Volume encryption 18:13:14 and this work is ready for review now 18:13:28 unfortunately, they haven't been getting as many eyes as they would like 18:13:36 https://review.openstack.org/#/c/30973/ 18:13:42 https://review.openstack.org/#/c/30974/ 18:13:47 https://review.openstack.org/#/c/30976/ 18:13:51 There's the links 18:14:04 I would encourage people to spend some time reviewing those 18:15:03 You can find other things that need review by checking the security mailing list archives and/or by search the various projects for security tags 18:15:23 list archives are here http://lists.openstack.org/pipermail/openstack-security/ 18:15:48 security tagged items look like: https://bugs.launchpad.net/keystone/+bugs?field.tag=security 18:15:57 similar link for other projects 18:16:10 for example 18:16:12 https://bugs.launchpad.net/keystone/+bugs?field.tag=security 18:16:43 for OSSG members that want to get involved with code-level contributions, this is a great place to get started 18:17:05 any questions about these? 18:17:44 you guys are quiet today :-) 18:17:53 ok, pushing forward 18:17:53 :) 18:18:14 #topic Ongoing security projects 18:18:29 There's a few ongoing projects to mention 18:18:45 Unfortunately, the people with knowledge on the current status aren't here today 18:19:05 There's the volume encryption work that I mentioned above 18:19:12 There's also work on a key manager 18:19:41 Greetings, sorry to join late 18:19:47 contacts for the key manager work include Jerret Raim (Rackspace) and malini1 18:20:03 nice timing malini1 :-) care to give an update on the key manager work? 18:20:55 going well, very few bugs left 18:21:04 on track for H? 18:21:11 the thing that concerns me more is no reviews of the volume encryption patches 18:21:11 need any review eyes or ?? 18:21:24 fair… so let's focus resources there 18:21:37 absolutely need review eyes, those are languishing and they are the proof of the pudding 18:21:56 sounds good 18:22:11 there are 3 a-- all by joel C 18:22:22 yeah, I've got links above 18:22:29 so they will be in the meeting transcripts 18:22:53 :-) 18:23:00 other thing worth mentioning in ongoing work is something that came out of the book sprint 18:23:17 while writing the book, the team captured a variety of security shortcomings in openstack 18:23:42 I'll be working with the book sprint team to triage these and figure out how to handle each one 18:24:02 These will end up as a collection of blueprints, bugs, security notes, etc 18:24:09 and a thought on libvirt connection, there is readonly mode which does not need credentials and one which needs credentials 18:24:13 so be watching here for updates on those in the coming weeks 18:24:29 it can be a pain to prompt and provide, but should this be something that is enforced 18:24:50 malini1 perhaps a worthwhile OSSN? 18:25:02 would you like to work with Rob on that? 18:25:03 a use case of libvirt connection is to obtain stats on cpu usage 18:25:12 sure 18:26:45 #action malini1 to work with Rob on OSSN for libvirt authentication best practices 18:27:08 #action bdpayne to work with book sprint team to push out security issues identified during the sprint 18:27:19 #topic Open Discussion 18:27:29 that's all I have for today… anything else that people would like to discuss? 18:27:35 BTW -- there is a pitch for geo tagging in NIST .. something to watch 18:27:46 link? 18:27:50 one second 18:28:03 http://csrc.nist.gov/groups/SMA/forum/documents/april2013presentations/forum_april_11_2013_bartock.pdf http://csrc.nist.gov/publications/drafts/ir7904/draft_nistir_7904.pdf 18:28:16 it is all fluffy right now, nothing implemented 18:28:24 interesting 18:28:26 what's the goal there? 18:28:33 to know where the cloud resources are located? 18:28:33 basically folks want to control where their payload runs, where their data is stored to meet 18:28:38 regulation requirements 18:28:46 makes sense 18:28:59 to truely now where machien is located needs GPS (which will not work in a bunker somewhere) 18:29:14 also those GPS co-ordinates have to be mapped to a country 18:29:42 and sub-area (say embassy in a foreign land or in international airspace or waters) which maynot be an issue 18:29:46 for data center 18:30:20 and all server chips today do not have GPS while phones etc do 18:30:34 may have to trust admin who deploys machine 18:30:42 ok, thanks for the pointer 18:30:47 that all we have time for today 18:30:50 to certify where it is located, and sign it 18:30:58 There were some research publications on this topic too, don't have the links right now, can send them if interested 18:31:11 please do, thanks 18:31:14 sure, perhaps start a thread on the securty mailing list 18:31:23 Ok, will do 18:31:27 thanks 18:31:36 have a great week everyone 18:31:40 bye 18:31:41 #endmeeting