17:00:41 #startmeeting security 17:00:42 Meeting started Thu Jul 23 17:00:41 2015 UTC and is due to finish in 60 minutes. The chair is tmcpeak. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:43 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:46 The meeting name has been set to 'security' 17:00:46 o/ 17:00:50 o/ 17:00:51 #topic Roll Call 17:00:52 hi 17:00:53 yo/ 17:00:55 o/ 17:01:00 o/ 17:01:02 hi 17:01:09 \o 17:01:10 bknudson: you say hello, and I say hi 17:01:10 I'm at the nova meetup since it's here in Rochester 17:01:20 bknudson: NY? 17:01:23 MN 17:01:31 bknudson: Oh right! 17:01:42 Glance wanted to co-locate and I would have driven over 17:01:42 bknudson: nice! 17:01:54 o/ 17:02:14 allright, I guess let's get rolling 17:02:15 I wonder why the glance colocation didn't happen 17:02:20 #topic Anchor 17:02:27 tkelsey, dg, Daviey 17:02:49 bknudson: we were told 'no' 17:02:49 some interesting work on alternative Anchor backends has been going on 17:02:54 o/ 17:03:02 Mr. Murphy, sit down, you're late :P 17:03:15 I've not been active on Anchor this week :( 17:03:20 soz. nasa things. 17:03:29 lol 17:03:38 tkelsey: describe said alternative backends plz? 17:03:47 I'm just trying to find the link 17:04:15 https://review.openstack.org/#/c/204368/ 17:04:32 o/ 17:04:42 hi timkennedy 17:04:46 hello. 17:04:49 happy thursday 17:04:52 tkelsey: interesting, have you guys been following whatever on ML? 17:04:57 so this is the patch, its a prototype to use pyasn1 and pycrypto to replace some of the stuff we built on top of pyca/crytography 17:05:08 Stan seems to have proposed this and then there was pushback, any update on that? 17:05:33 tmcpeak: ah im not actually sure 17:05:40 * tkelsey goes to read the ML thread 17:05:47 Stan has also volunteered to write a Spec about how we should be interacting with openssl primatives 17:05:48 tkelsey: why replace pyca/crytography 17:05:55 fair enough, I guess I could actually read ML once in a while:P 17:05:58 Ah, i type too slow. 17:06:21 browne: the work we did was a stop gap untill pyca/cryptography got the features we need. But it seems that hasnt happened yet 17:06:50 tkelsey: you could contribute to pyca/cryptography, :) 17:06:50 so this is an exploration into another approach 17:07:00 browne: I did :) 17:07:14 but there is a lot needed and I only have so much bandwidth 17:07:17 ok, if Bandit experience is any guide I'd say hash it out with a doc first rather than code ;) 17:07:29 tkelsey: Have we enumerated the gaps in pyca/cryptography, for our needs? 17:07:35 tmcpeak: there is an eatherpad going round with it in 17:07:38 but yeah 17:08:00 I saw a bug floating around, but no detail 17:08:02 ok, maybe if it hasn't been done already socialize the presence of the wiki on ML so the naysayers can jump in and say nay on the etherpad 17:08:04 its mostly around the handling of asn1 types and come of the low level CFFI hooks 17:08:12 *some 17:08:34 err socialize the etherpad ;) 17:08:50 there is also a desire to break free of OpenSSL requirements.... Yeah I'll dig up a lionmk 17:08:53 *link 17:09:31 ta 17:09:40 maybe also on the ML, I don't remember who was against it, but seems like they had fairly strong opinions regarding it 17:09:40 https://etherpad.openstack.org/p/Anchor_direct_asn1 17:10:08 tmcpeak: OK, ill go dig into that 17:10:17 sorry im a bit behind this week :) 17:10:37 tkelsey: that's because you're busy writing whole bookcases worth of doc improvements for Bandit :P 17:10:52 lol, well yeah there is that :P 17:10:57 cool, so anything else for Anchor before we switch to Bandit? 17:11:15 I dont think so, I will try to have more detaisl for us next week 17:11:18 *details 17:11:29 sweet, thanks tkelsey 17:11:32 #topic Bandit 17:11:47 browne: care to share the good news? 17:12:04 yep, nova patch to introduce bandit merged, yay 17:12:09 woot 17:12:12 but still need to add the gate job 17:12:14 looks like Cinder is close behind 17:12:16 :D nice one browne 17:12:24 yeah, cinder is close 17:12:29 Bandit is now in Debian as of today, and in Ubuntu as of 2 mins ago. 17:12:32 are you planning to introduce as experimental or non-voting? 17:12:40 thats awesome 17:12:40 Daviey: hah, what? 17:12:44 2 mins ago? sweet! 17:12:46 non-voting is the plan 17:12:52 tmcpeak: Yeah, i just sync'd it in 17:13:00 Daviey: legit! 17:13:06 browne: cool, I think that makes sense 17:13:18 Daviey: very cool 17:13:27 I'm wrapping up something at the day job, but next week I'm planning to circle back and do some Bandit gate related stuff 17:13:29 Daviey: sick. i meant to ping you about that. 17:13:29 tmcpeak: compiling now, https://launchpad.net/ubuntu/+source/bandit/0.12.0-1/+build/7719180 17:13:32 can start on some way to keep track of everything 17:13:37 any plans for the fedoras etc? 17:13:54 noice! 17:13:55 i can probably pick that up if 17:13:59 not 17:14:04 gmurphy: I wouldn't know where to start with Fedora TBH.. I think there are better qualified people here than me for that :) 17:14:11 k. 17:14:15 gmurphy: i think it has already been accepted into fedora 17:14:19 * elmiko digs for link 17:14:21 really? 17:14:26 yeah, I think Fedora had it first 17:14:30 yea 17:14:30 we also have archlinux 17:14:33 god you've got to be quick. 17:15:06 so folks on our team got excited about bandit =) 17:15:09 i did't even check the package repo before i raised that bug actaully 17:15:29 people have been clamoring for a static security analyzer 17:15:32 https://admin.fedoraproject.org/pkgdb/package/bandit/ 17:15:35 we should be charging for it 17:15:44 bknudson: +1 :P 17:15:47 elmiko: Is it hitting RDO or not? 17:15:59 this is awesome. 17:16:03 Daviey: that is a good question, i'll ask around 17:16:13 we have started adding bandit to CI/CD for internal projects 17:16:22 #link https://bugzilla.redhat.com/show_bug.cgi?id=1217857 17:16:23 bugzilla.redhat.com bug 1217857 in Package Review "Review Request: bandit - A framework for performing security analysis of Python source code" [Medium,On_qa] - Assigned to zbyszek 17:16:24 gmurphy: ^^ 17:16:29 elmiko: Error: Could not parse XML returned by bugzilla.redhat.com: HTTP Error 404: Not Found 17:16:35 yeah cool. 17:16:48 ok. well i guess i can close that bug out. 17:16:55 elmiko: The next release will have more sane global bandit.yaml config handling... Would be good to get that in rpm aswell 17:17:10 awesome, i'll pass it along 17:17:42 We could also poke AJaeger into trying to get it in opensuse 17:17:55 moar distros! 17:18:28 tmcpeak: +1 17:18:40 awesome! really exciting Bandit updates this week guys 17:18:46 tkelsey: want to mention the doc work you're doing? 17:19:15 yup :) so last week I was pushing for bug killing, this week its docs 17:19:22 https://review.openstack.org/#/c/204136/ 17:19:28 Oh! This week, we also got sane plugin interface for bandit. 17:19:40 Daviey: yeah :D 17:19:46 all the improvements!! 17:19:53 Which also means we have support for external plugins now 17:20:07 Yep 17:20:17 We advertised that support previously but now we actually have it 17:20:20 so that patch is a massive one, and I expect a lot of nits to pick etc 17:20:33 seems like we'd want to pull the openstack-specific checks into a separate repo 17:20:39 so anyone with spare cycles please go look it over, or at least as much as you can manage :) 17:20:53 tkelsey: would it be possible to split that up into a chain of dependent reviews? 17:20:59 bknudson: not a bad idea 17:21:02 1868 lines of docs is going to be ... rought 17:21:09 Oh crikey, that is huge tkelsey 17:21:24 bknudson: yeah, I like that idea 17:21:32 sigmavirus24: thats only about 50% done :-/ I am writing it and pushing it as I go 17:21:41 would make it more appealing as a general tool 17:21:54 tkelsey: Much of it is stub pages, that can stay in one commit OMO 17:21:57 IMO* 17:22:14 Daviey: ohhh now you're all for one commit... ;P 17:22:16 would be nice if the docs were in docstrings 17:22:22 so you don't have to find the doc file 17:22:33 elmiko: Pah... no, one commit for stub's is OK :) 17:22:40 the stub pages are slowly being replaced by real content, I prefer to blast this stuff out and then iterate on it... but yeah its a monster 17:23:09 any suggestions for a sensible way to chop it up ? 17:23:29 Thing is, with a monster stub commit.. it makes it easy to have many smaller commits replacing it which don't need to be linked / Depends 17:23:29 well you could do the infra part of it separate, then just maybe cut the docs into thirds? 17:23:52 Daviey: makes sense 17:23:55 tmcpeak: yeah 17:23:56 Daviey: I thought this was the one you were complaining about earlier :P 17:24:15 OK, I will look to add in stubs and the build new patches to replace them incrementally 17:24:21 tkelsey: for i in $(git status) ; git branch -b $i ; $PROFIT ; done. etc 17:24:50 lol, yeah splitting it up is easy enough, I just like to work on it atomically 17:25:05 anyway, its going to be way too big as one for sure 17:26:08 so yeah, I'll do an patch for tox etc, then a patch for the skeletal layout, then many patches to add content 17:26:12 hows that sound? 17:26:17 SGTM 17:26:18 Thanks tkelsey 17:26:34 awesome :) im looking forward to having comprehensive docs 17:26:38 awesome, so I'll just take a minute to do some high level back patting 17:26:40 :D 17:26:41 tkelsey: Yeah, that makes sense 17:26:46 Bandit has a great community with lots of people putting in great work 17:26:53 I'm really happy to see the progress, and keep it up! 17:27:01 :) 17:27:11 * sigmavirus24 takes that statement to mean the people are mediocre =P 17:27:14 tmcpeak: At some point, we do need to think of new plugins... We are mostly polishing atm 17:27:28 Daviey: for sure 17:27:44 #topic Sec Guide 17:27:49 sicarie, elmiko, Daviey 17:28:03 tmcpeak, Daviey i've been experimenting with a few for sahara 17:28:06 They said it couldn't be converted in a week... 17:28:11 rst conversion is going well =) 17:28:21 sec guid looks to be getting some serious love :) 17:28:26 elmiko: awesome, looking forward to seeing them 17:28:30 indeedy 17:28:33 yeah, you guys are going nuts on that 17:28:42 The sec guide rst has been Ninja'd 17:29:07 #link http://etherpad.openstack.org/p/sec-guide-rst 17:29:08 Yep, the conversion to RST format is going really well 17:29:12 Thanks Daviey 17:29:14 Just about to post that 17:29:15 other than that, i think we might have found a few bugs to publish during this conversion too 17:29:17 ^^ still spaces if people want to jump in the water. 17:29:22 +1 elmiko 17:29:54 So we have dg_, pdesai, Daviey, elmiko, and AJaeger doing awesome work converting and reviewing 17:30:02 #link http://docs.openstack.org/draft/security-guide-rst/ 17:30:07 ^^ this is what has landed so far. 17:30:12 elmiko could do with you taking another look at this, https://review.openstack.org/#/c/205099/ 17:30:14 nice! 17:30:15 We're through most of the individual chapter files, and are now focused on the sections 17:30:34 elmiko Im happy to change it if I need to, just trying to do what he docs say... 17:30:39 dg_: ack 17:31:00 * Daviey glares at dg_ for large commits. 17:31:22 Heh, and aside of some stylistic preferences, things are moving along 17:31:25 dg_: hmm, i didn't realize we weren't supposed to use doc references 17:31:28 Daviey should I do them as a series of smaller commits? 17:31:48 dg_: i like the doc references for these because it automagically pulls the title in place 17:31:50 dg_: There is disagreement... It is fine :) 17:32:12 Daviey ok :) 17:32:32 I'll go with the majority on the doc vs ref, Im new to RST 17:32:33 dg_: i'll ask in #-doc to see what they think 17:32:39 elmiko thanks :) 17:32:45 cool, great work on the guide guys 17:32:50 i've been using :doc: fwiw 17:32:56 anything else to mention this week? 17:33:06 on the sec-guide 17:33:35 We are also now linting the document, where as previously we just pretended to... thankfully, it was caught early and there wasn't too many issues. 17:33:40 navigating the new rst sec guide as its generated locally and shown here: http://docs.openstack.org/draft/security-guide-rst/# is a bit of pain because it no longer has the index on the left 17:33:59 oh that's cool, real linting beats pretend linting everytime 17:34:01 dg_: please post that at the bottom of the etherpad where we're tracking issues 17:34:12 is there the option to re-add the index? If not, we should consider having a link to 'top of this section' and 'index' on each page 17:34:26 Is that a problem for US to sort out, or a general issue with the openstack rst theme? 17:34:30 dg_: we'll have to ask the docs team 17:34:35 +1 Daviey 17:34:40 Does the other projects suffer the same issue? 17:34:44 I'll take the action to figure that out 17:34:47 cool 17:35:05 shweet 17:35:06 +1 Daviey 17:35:31 #topic API Testing 17:35:43 Just a general note, I now recognize how much i hated docbook. I think i had Stockholm syndrome 17:35:51 lol 17:35:56 he he 17:36:00 +1 17:36:10 i have no updates on API Testing today, i'm afraid 17:36:12 mvaldes: how's it going on the API fuzzing tool? 17:36:13 ahh ok 17:36:36 #topic Other Business 17:36:39 mvaldes: You were going to see if you could show a public demo of the PoC you had? 17:36:39 open floor 17:36:41 it's been slow going on the clean-up. expect more next week :) 17:36:52 mvaldes: :) 17:37:04 so I'd like to bring up the note I'm working on 17:37:10 since there are general keystone experts herre 17:37:35 specifically this: 17:37:37 #link https://bugs.launchpad.net/bugs/1464750 17:37:38 Launchpad bug 1464750 in OpenStack Security Notes "Service accounts can be used to login horizon" [Undecided,In progress] - Assigned to Travis McPeak (travis-mcpeak) 17:37:46 Launchpad bug 1464750 in ossn "Service accounts can be used to login horizon" [Undecided,In progress] 17:37:47 Launchpad bug 1464750 in ossn "Service accounts can be used to login horizon" [Undecided,In progress] https://launchpad.net/bugs/1464750 17:38:09 bknudson: I've spoken to nkinder a bit, I'm curious for your take 17:38:42 do you think mucking around with policy.json like this is something we should be comfortable recommending to end users? seems like a major overhaul and could have ramifications 17:38:54 I think this is related to the default policy in openstack where if you have a role on a project then you can do a lot of things 17:38:57 like boot an instance 17:39:15 the only way this could be fixed is by changing the policy 17:39:23 yeah, service accounts are admin, and therefore can do all the things 17:39:26 tmcpeak: policy.json isn't an end user file, but a cloud admin config file 17:39:38 so it's either the customer changing their policy or us changing the default policy 17:39:51 oh sorry, I meant cloud admin when I'm saying "end user" like not OpenStack developers 17:39:52 I'd like to have a better default policy but that's not a security bug in itself. 17:40:04 cloud admins should be entrusted to make config hardening choices based on OSSN guidance IMO. 17:40:04 not all service acccounts are admin 17:40:09 in the default policy 17:40:21 I mean in the default setup (devstack) 17:40:36 only nova and neutron service users are granted admin 17:40:50 other ones have "service" role 17:40:55 changing policy.json is unlikely to be stable compatible. 17:41:00 oh ok, that does reduce the surface somewhat 17:41:11 but as I said, if you have any role on a project then you can boot an instance 17:41:59 that's not what we're worried about though is it? 17:42:09 Some deployments might want that behaviour, which makes it probably incompatible with stable/* policy. 17:42:14 we're worried about deleting data, creating malicious users, etc 17:42:22 the nasty stuff cloud admins can do 17:42:23 I think that's what the bug is describing 17:42:38 even if you take away nova's admin auth 17:42:45 nova will still be able to boot instances 17:42:51 (same with neutron) 17:42:54 well the actual bug is talking about logging in to Horizon, which is a little silly 17:42:56 and they'll be able to login to horizon 17:43:01 anything you can do with Horizon you can do with the APIs 17:43:19 I don't know if there's a role required to login to horizon 17:43:32 I don't think so, I think Horizon is just a dumb-front end for the APIs 17:44:09 ok, well not to rathole this super far, but it seems like bknudson Daviey agree it's feasible to at least write guidance about this 17:44:14 so I'm going to go ahead and do so :) 17:44:34 I'm not a Keystone expert, I just play one when I'm writing notes 17:44:37 problem is there's no docs on the policy.json s 17:44:58 keystone/nova/neutron 17:44:59 etc 17:45:16 bknudson: Empty string being permissive is a questionable choice IMO :) 17:45:18 so I couldn't tell someone how to set up their policy to prevent this. 17:45:34 bknudson: yeah, nkinder helped point me in the right direction 17:45:43 between that and screwing around with devstack for a bit I should be able to figure it out 17:46:56 cool, anything else to bring up? 17:47:01 Does anything need to be mentioned about the middcycle? 17:47:18 yeah, saw it on the agenda, guess we could go into it really quick :) 17:47:21 #topic Midcycle 17:47:35 is anybody interested in coming that hasn't put their name on the etherpad? 17:47:45 #link https://etherpad.openstack.org/p/security-liberty-midcycle 17:48:05 Yes, but no funding. Poor me. 17:48:35 :\ 17:48:50 would be cool to have you there 17:48:55 maybe you can stay in that AirBnb tent? 17:49:16 +1 17:49:18 hah, thanks 17:50:13 looks like a pretty decent list of folks 17:50:27 browne: you going to make it? 17:51:01 tmcpeak: i should, let me confirm with my manager today 17:51:04 ok cool 17:51:07 bknudson: how about you? 17:51:43 elmiko? 17:52:20 i've passed the numbers up the chain, still waiting for clearance :/ 17:52:26 i would really like to be there =) 17:52:31 ok cool, fingers crossed then 17:52:56 cool, anybody else have anything they'd like to discuss before I close out? 17:53:38 allright then, everybody have a good week! 17:53:40 #endmeeting