17:00:57 #startmeeting Security 17:00:58 Meeting started Thu Aug 6 17:00:57 2015 UTC and is due to finish in 60 minutes. The chair is hyakuhei. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:59 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:01:02 The meeting name has been set to 'security' 17:01:03 yo yo 17:01:05 hi 17:01:05 sup peeps! 17:01:09 heyo/ 17:01:11 o/ 17:01:12 Hola \o 17:01:21 hi 17:01:33 lol, hola 17:02:02 Right, first off thanks for tmcpeak for filling in during these meetings, from what I’ve read he’s done a stand up job! 17:02:16 that's way overblown, but my pleasure :P 17:02:19 * hyakuhei has to talk to these pesky customers! 17:02:19 here here 17:02:33 :) 17:02:43 I’m actually on the road again today 17:02:45 so 17:02:47 #chair tmcpeak 17:02:48 Current chairs: hyakuhei tmcpeak 17:02:51 lol 17:02:55 hey 17:02:55 hah 17:02:58 Just in case my internet explodes :) 17:03:00 :) 17:03:35 ok, lets get an agenda going, we’ve got the standard activities: OSSN, Anchor, Bandit + That intel CVE stuff + Some wiki stuff + mid cycle 17:03:37 What else? 17:03:50 sounds like a reasonable lineup 17:03:57 sec doc 17:04:01 good call 17:04:10 api fuzzing ? 17:04:11 I think Nathaniel is PTO atm 17:04:23 tkelsey: yes if michaelxin is here 17:04:24 hyakuhei, yea, i've been filling in for him 17:04:30 elmiko: superb 17:04:47 No nkinder either 17:05:13 #topic OSSN 17:05:24 We have 14 OSSN open at the moment, that’s pretty high 17:05:27 #link https://bugs.launchpad.net/ossn 17:05:29 :\ 17:05:41 ooph 17:05:52 i'll make an effort to pick another one up 17:05:53 gosh 17:06:01 If we’re offering this service to the community and to the VMT we need to be able to close these out 17:06:06 i haven't written one yet.. so I could probably step and and do one.. 17:06:14 Awesome 17:06:24 I doubt you need any mentoring gmurphy but reach out if you need any help 17:06:31 yeah, I'll prioritize taking one also 17:06:35 I've got two inflight that need to be closed out.. blocked on me now i think 17:06:43 I’ll try to get one written on the plane 17:06:56 is there a priority to these or is it just pick one at random? 17:06:57 If you’re stuck on one, send a mail to -dev 17:07:01 link to the review 17:07:18 Plenty of developers like to correct OSSNs :) I’m sure they’ll help 17:07:23 lol 17:07:25 No one expects security to be experts on everything. 17:07:38 (They do, they shouldnt) 17:07:52 +1 17:07:54 Ok, So yeah, lets see if we can close out on a bunch of OSSN before the mid-cycle that would be great 17:08:07 tkelsey: much to say on Anchor this week? 17:08:20 nope, lots of stuff in review though 17:08:28 i've been kinda busy this week 17:08:38 #topic Anchor 17:08:39 Anchor now has working Keystone Auth.. if a little crappy still. 17:08:58 The Devstack integration has been tested with dg.. but other feedback welcome! 17:09:04 I think this #link https://review.openstack.org/#/projects/openstack/anchor,dashboards/important-changes:review-inbox-dashboard will work for anyone who wants to look at anchor, it might only work for cores though ? 17:09:06 https://review.openstack.org/#/q/project:openstack/anchor+status:open,n,z 17:09:25 tkelsey: that’s a better #link https://review.openstack.org/#/q/project:openstack/anchor+status:open,n,z 17:09:27 hyakuhei: link works for sll 17:09:36 *all 17:09:40 Did you discuss the API changes last week? 17:09:54 a little 17:09:55 yes 17:09:59 we decided jfdi 17:10:00 Basically, we’re about to break the API, kthnxbye. 17:10:05 oh yeah, JFDI 17:10:07 +1 17:10:08 lol 17:10:12 Rolling on... 17:10:14 #topic Bandit 17:10:22 new version of Bandit (0.13.0) 17:10:24 hit yesterday 17:10:39 mostly good, but there seems to be some cases where old profiles don't have what they need for new tests 17:10:50 so we're working on more sensible notification rather than spamming exceptions 17:10:56 then we'll get (sigh) 0.13.1 out 17:11:09 also Bandit landed in Cinder 17:11:16 well landed as in there is now a tox profile 17:11:21 not gate yet, but browne is working on it 17:11:30 tkelsey is a mad man with docs... 17:11:44 and we've discovered we really need some gates that test integration points with other project 17:11:49 tmcpeak: heh yeah, i'll be back on those soon :) 17:11:54 will probably hack on that in midcycle 17:12:23 I think that's it.. anything I'm forgetting? 17:12:39 tmcpeak: is .1 being done for teh config issue? 17:13:10 Daviey: yeah 17:13:17 ta 17:13:24 at what point would we ever update g-r with a newer bandit? 17:14:02 browne: I don't think we need to 17:14:07 when I change keystone to use any new config or tests I'll update g-r. 17:14:08 most projects should pull the latest 17:14:33 or if any other project wants to do it then they can update g-r 17:14:46 do we need to? projects can use whatever Bandit they want 17:14:50 no reason they can't use older if they want 17:15:07 0.10.0 was broken, but other than that they're all good 17:15:38 g-r has bandit>=0.10.1 17:15:41 g-r contains bandit>=0.10.1 17:16:03 yeah, so that should be fine, right? 17:16:26 Yeah, any version above that is good.. but most projects will take latest 17:16:32 so if g-r is >=0.10.1, can a project only support 0.10.1 checks. or is it ok to support newer checks found in say 0.13? 17:16:34 even better :D 17:16:43 ERR 17:16:52 *STOP PRESS*.. upper-requirements has bandit===0.12.0 17:16:55 browne: no, you can't expect 0.13 to be used unless g-r has 0.13.0 17:16:56 SO that does need updating 17:16:59 wut 17:17:14 yikes 17:17:19 bknudson: g-r is not the issue here 17:17:27 well if that's the case how did Cinder even get 0.13.0? 17:17:27 does upper-requirements get updated automatically? 17:17:47 nobody knows ;) 17:17:53 I heard elves come in and update it randomly 17:17:53 Shall we take this offline? :) 17:17:56 I thought there was a job that updated it. 17:18:00 yeah fair enough 17:18:13 cool, so that's good for Bandit I think 17:18:19 Sweet 17:18:21 #topic CVE Check tool 17:18:26 #link http://permalink.gmane.org/gmane.comp.cloud.openstack.devel/60983 17:18:30 Thoughts on this ? 17:18:53 It can't belong in/near bandit IMO.. which was an idea.. 500MB of metadata to download? :o 17:18:57 it could be useful, but it's got a big download requirement, so we really want to make sure we run it as infrequently as possible 17:19:06 yeah, definitely shouldn't be part of Bandit 17:19:11 CVEaaS 17:19:14 I responded on list, honestly I’m not sure it makes as much sense in the infra gates as it does as a tool for vendors - perhaps even on the customer side as the libraries you ship with might become vulnerable over time 17:19:15 Doesn't this tool just work for .deb / .rpm packages? 17:19:23 I haven't really checked it out. 17:19:25 gmurphy: no, it looks at the lib versions I think 17:19:26 hyakuhei +1 17:20:06 I mean, if say, Nova explicitly requires a very specific, very broken library, I guess that’s a good change to flag ahead of +2 and integration 17:20:08 hyakuhei: sure, but I think there's arguably some value to making sure blessed versions don't have CVE's upstream supposing it works reliably 17:20:11 Are they trying to get this picked up by the OSSG? 17:20:14 So I can see where it might be used 17:20:20 as in, OSSG owns it now? 17:20:20 bknudson: we swallow up everything! 17:20:23 bknudson: no 17:20:33 but it’s relevant to our conversations 17:20:43 yeah, we don't have bandwidth for it, we can't even write notes reliably :P 17:20:48 do they want us to submit CVEs for openstack to it? 17:20:51 tmcpeak: back in the corner! 17:20:56 :# 17:21:12 bknudson: No - it’s mainly a back-stop tool 17:21:26 I'm just wondering what they wanted... just to tell us it exists? 17:21:35 hang on where is a link to this tool.. is it this? https://github.com/ikeydoherty/cve-check-tool 17:21:39 I think the discussion was going down, should openstack/requirements changes have a gate check on it 17:21:40 if I was an operator I'd be interested just like I'm interested in nessus, etc. 17:21:42 To see if there was interest in it and how to leverage it 17:21:44 bknudson: good point, maybe they wanted validation that it's useful first? 17:21:49 or where might be best to leverage it 17:21:53 tmcpeak: +1 17:22:12 and yeah, as hyakuhei said, to find the best integration points 17:22:22 it's written in c. 17:22:27 It seems entirely reasonable for the project to do some validation of known bad libraries... but not the project as a whole-job. That is what vendors are for IMO :) 17:22:29 these people are masochists 17:22:39 lol 17:22:54 C is an interesting choice for something like this 17:22:58 bknudson: lol 17:23:10 We work with those tools that are closest to us 17:23:29 fair enough 17:23:37 ok, so I guess continue discussion on thread, keep an eye on it to see if it turns into something more useful 17:23:46 sounds good 17:23:48 lol c 17:23:53 Write an exploit that uses a BOF in a CVE to wown the C based CVE tool 17:23:56 there's lots of useful security tools out there. 17:24:04 hyakuhei, ouch... 17:24:13 * elmiko is an old school C hacker =( 17:24:20 Ok, lets move swiftly along 17:24:25 #topic Wiki 17:24:42 I’ve spent some time trying to update our wiki 17:24:44 #link https://wiki.openstack.org/wiki/Security 17:24:49 I think it’s a lot less crap now 17:25:03 ruh roh, hit another issue with Barbican/Cinder/Nova in devstack. http://paste.openstack.org/show/411216/ 17:25:13 damn, wrong room, sorry! 17:25:16 but my writing skills aren’t perfect so please jump in and tidy it as required. 17:25:43 Anyway yeah, please feel free to add or correct content on the wiki 17:25:45 ack 17:25:54 hyakuhei: it looks good! 17:25:57 hyakuhei: thanks! less crap is good 17:26:14 oooooh, you've sprinkled shinies in it 17:26:32 I tried to order it a bit more sanely, highlight more of what we do, spread the credit around etc but yes, someone who’s good at technical writing needs to go through it 17:26:44 looks better. we should probably figure out what needs to be done with security.o.o too.. 17:26:49 hyakuhei: looks legit 17:26:50 ooo, that is a pretty picture. 17:26:51 gmurphy, +1 17:27:00 and yea, the intro pic is nice on the wiki =) 17:27:18 Old version for reference : https://wiki.openstack.org/w/index.php?title=Security&oldid=75645 17:27:25 (and in case I missed anything) 17:27:30 eww 17:27:32 hyakuhei: Blog coming soon? Is this news? 17:27:35 night and day 17:27:39 Yeah 17:27:49 So I’m attempting to get us some proper blog space 17:27:55 cool! 17:28:04 Over on #link http://www.openstack.org/blog/ 17:28:18 Somewhere to announce OSSN's! :) 17:28:20 There’s some discussion as to wether our content would be too technical, the blog is for higher level stuff 17:28:25 Daviey: exactly 17:28:49 hyakuhei: a subdomain of that maybe? 17:28:52 we already do have ways to advertise our stuff. 17:28:52 So we’ll see what happens, we will have a multi-user blog somewhere soon. openstack.org is my preference but if not we’ll put it elsewhere 17:29:09 e.g. our stuff winds up on openstack-announce. 17:29:11 I'd like to read a security blog but maybe not some of the rest of that stuff :P 17:29:16 tmcpeak: So my preference is to have Security as one of the listed catagories on the blog 17:29:22 Failing that we have lots of options 17:29:35 Potentially hanging something off of security.openstack.org for example 17:29:43 http://i1.wp.com/openstackreactions.enovance.com/wp-content/uploads/2015/07/h3imQSu.gif?resize=320%2C240 17:29:44 Though that’s fraught with potential issues 17:30:14 thanks tmcpeak, i'm scarred now... 17:30:18 :D 17:30:20 So anyway yes, exciting super sexy blog on its way 17:30:28 hyakuhei++ 17:30:28 To which you’ll all be invited to attend 17:30:36 sounds good 17:30:40 s/attend/write 17:30:47 haha 17:30:49 Ok, next up lets have elmiko talk about docs 17:30:53 #topic Security Docs 17:30:56 alrighty 17:31:05 we are closing in on the last few fixes for the rst conversion 17:31:17 might be interesting to get a blog about how OSSG is helping companies deploying / developing openstack 17:31:27 e.g., if you're running bandit, etc. 17:31:27 i think we just have 2 outstanding issues, and then some smaller fixes that can be done once the rst is in place 17:31:36 bknudson: +1 17:31:36 bknudson, awesome idea +1 17:31:48 The last blocker on the theme is about to be merged, which was something else we were blocking on. 17:31:55 That’s excellent 17:32:00 well done elmiko 17:32:04 we will most likely wait until sicarie is back from black hat/defcon before we make the jump to hyperspace (siwtch to rst) 17:32:06 So glad to see this progressing 17:32:13 bdpayne would be so proud :’( 17:32:22 :'( 17:32:33 yea, good point Daviey 17:32:43 * elmiko sniffles 17:32:45 So is there anything we can do to help elmiko ? 17:33:07 i don't think so, we are steadily moving towards the big unfreeze and switchover 17:33:29 maybe more reviews, when things go up. but it's pretty small at this point 17:33:44 elmiko: Wasn't it agreed that it was now unfrozen, just don't expect to see changes until the switchover? 17:33:50 oh, and we'll need eyes to check the consistency of the final rst stuff, but we have been trying to do that as well 17:33:55 Great, I’m looking forward to getting some reviews in. When’s the expected date for the switchover? 17:34:20 Daviey, good question, i think we can unfreeze but all new changes should go to RST only 17:34:38 although we probably shouldn't do that until we switch 17:34:45 hyakuhei, i'm guessing another week, perhaps 17:34:53 gotta find out when sicarie is back 17:35:04 coolio 17:35:10 Anything else elmiko ? 17:35:13 elmiko i think he is back next week 17:35:24 i don't think so, unless Daviey has something more 17:35:29 dg_, ack, thanks 17:35:40 Just that the current draft switchover can be reviewed already, http://docs.openstack.org/draft/security-guide-rst/ 17:35:57 catch stuff early etc. 17:35:58 excellent, thanks Daviey 17:36:26 we're using this etherpad for collecting bugs if people find any 17:36:29 #link https://etherpad.openstack.org/p/sec-guide-rst 17:36:37 looks good 17:37:00 agreed, i really like the rst format for the guide 17:37:09 rst >> xml 17:37:20 * > xml 17:37:24 so true.... 17:37:36 RST is going to make this so much easier 17:37:43 ok, so - mid-cyle? 17:37:46 #topic Mid-Cycle 17:37:53 #link https://etherpad.openstack.org/p/security-liberty-midcycle 17:37:59 #tlink https://wiki.openstack.org/wiki/Sprints/SecurityLibertySprint 17:38:23 thans for getting the agenda started hyakuhei 17:38:24 I’ve put some agenda stuff up, I think the way we ran things last time went well 17:38:32 +1 17:38:57 so day one we can do an initial description and see what people are interested in? 17:39:03 Put some vauge feel for how much effort is required for each activity and we can break them up so that people get involved with as many things as they want 17:39:06 looks nice 17:39:22 how about social gathering? we doing one? 17:39:26 People proposing topics should fill out the ether pad, we’ll use them as the basis for an unconference 17:39:44 tmcpeak: I’m not asking HP to sponsor as they’re covering the room and breakfast/lunch 17:40:16 Social gatherings are normally a good idea though, we could pay for ourselves? *gasp* 17:40:16 yeah fair enough, I don't think HP needs to sponsor. Maybe we can just all go out somewhere/ 17:40:19 ? 17:40:32 yeah, +1 pay for ourselves 17:40:43 so I will go to a bar at some point in that week, you are welcome to join tmcpeak ;) 17:40:45 Works for me, I’ll get someone seattle based to look into it. Plenty of nice places for food 17:40:55 We could go to whatever von-trapps is called now and play some bocce 17:40:59 dg_ Tuesday early morning per normal? :P 17:41:00 I think we did that last time though? 17:41:04 standard 17:41:15 von-trapps is always fun 17:41:16 Anyway, any questions about the mid-cycle ? 17:41:19 kells? 17:41:32 dg_ +1 17:41:33 elmiko: you coming? 17:41:47 Lets work out which bar to drink dry in the #openstack-security room 17:41:48 still wish i knew... 17:41:58 http://www.capitolhillseattle.com/2014/08/von-trapps-changes-name-to-rhein-haus-following-name-dispute/ 17:41:59 i keep pestering, but i keep getting the brush off 17:42:07 Though I don’t have much else to cover over today :P 17:42:14 #topic Any Other Business 17:42:26 No API fuzzing demo? 17:42:43 So the votes are in for the Security track, I’ve not been able to do much analysis other than to recognise that voting just doesn’t work very well. 17:42:56 boo =( 17:43:05 hyakuhei, is any of this public yet? 17:43:06 hyakuhei: you know when we'll find out? 17:43:12 Thankfully we’ve got some good track chairs and some great content so I’m confident of a good show at the conference, its just a lot of work for the chairs 17:43:23 so the vote doesn't matter? 17:43:24 elmiko: no 17:43:29 bknudson: It’s a guide 17:43:36 but when there’s 1500 things to vote on 17:43:40 It’s a pretty terrible guide 17:43:54 1500 things all with 1 vote by the submitter 17:43:57 We do our best to represent interest, deconflict talks and make a compelling track 17:44:17 who's on security track (where do I send bribes)? 17:44:19 The votes don’t get made public but the track selections do 17:44:24 I'm glad it's not just the votes. 17:44:34 bknudson: +1 17:44:41 one second I’ll see if I can find the release date 17:44:46 bknudson, yea, that would be rough 17:45:21 otherwise we'd wind up with donald trump 17:45:26 haha 17:45:30 :) 17:45:37 ha! 17:45:40 My understanding is that the official notifications go out the week of august 26th though that’s subject to slippage etc 17:45:57 not leaving a ton of time for booking, is it 17:46:37 tmcpeak: is your attendance dependent on an approved session? 17:46:49 browne: yeah 17:46:55 ooph =( 17:46:55 ouch 17:47:10 Japan flights don't come cheap ;) 17:47:12 Off US soil… 17:47:24 My vote is for hawaii next 17:47:28 +1 17:47:30 +2 17:47:31 +1 17:47:35 yeah, that'll work 17:47:47 fwiw Chairs are from Intel, HP, Redhat and one other I dont remember 17:48:08 We’re going to have a summit track too 17:48:08 it'll probably end up being like Philadelphia or something ;) 17:48:25 We’ll discuss more about that after the mid-cycle unless forced to do it sooner by the scheduling gods 17:48:29 tmcpeak: hush 17:48:46 next is austin i thought? 17:48:53 austin and then barcelona 17:48:54 Nah, Mars One. 17:48:59 haha 17:49:04 What’s the Tokyo +1 location ? 17:49:09 Cool 17:49:15 Not been to either of those places yet 17:49:21 likewise 17:49:37 Tokyo, Austin, then Barecelona 17:49:42 Tidy 17:49:54 Then USA then Asia I guess? 17:50:05 north america 17:50:14 or south america? 17:50:15 HK was really under-subsribed iirc 17:50:27 *subscribed 17:50:38 i feel that won't be the case for tokyo 17:50:42 tmcpeak: As we’re on AOB do you want to talk about your PyPI stuff? 17:50:46 elmiko: I hope so 17:50:50 hyakuhei: sure 17:51:08 surprised Chicago hasn't been selected yet. right in the middle of the US 17:51:20 hopefully we can have a more productive design summit to make the flight worth it 17:51:29 so I worked with dstufft and got a change merged into PyPI that blocks IP and user after 10 failed logins 17:51:31 browne, yea curious 17:51:41 but it's always hard to get a lot done in a short amount of time 17:51:47 tmcpeak, nice! 17:52:01 primary concern is that somebody will target a crap password in one of the upstream requirements and merge some malicious code, etc 17:52:10 so this is one step closer to preventing that attack 17:52:27 next up I'm going to set up email notifications for repo owners when a new package is uploaded or their password is changed 17:52:35 tmcpeak: sounds like you're talking about a cve checking tool 17:53:03 bknudson: no, basic security controls for PyPI is what I'm currently thinking about :) 17:53:23 tmcpeak: good stuff 17:53:38 tmcpeak: How many Users does that help vs just developers? 17:53:59 I mean, it sounds like a good control to have. 17:54:00 I think there are groups planning to continuously deploy from master and using pypi for packages 17:54:01 tmcpeak, that's awesome 17:54:18 Yeah it’s pretty useful 17:54:28 yeah, it's kind of scary how central PyPI is in everything 17:54:32 +1 17:54:34 dstufft is doing great work, but he's so understaffed 17:54:56 PyPI has kind of grown to massive importance over time, was never designed for the key role in open source software it currently has 17:55:33 so yeah, until PyPI 2.0 (warehouse) hits, might as well get the one everybody is using to implement some basic controls 17:55:39 is it a one person operation? 17:55:44 elmiko: yeah, basically 17:55:49 oh wow... 17:55:51 crikey 17:56:06 if you ever meet dstufft buy him beers :) 17:56:07 they have a bug log, or accept patches or anything? 17:56:12 All the beer 17:56:16 hyakuhei++ 17:56:24 elmiko: yeah, you can talk to dstufft, he was very helpful in getting my change merged 17:56:26 ok, I think that’s a wrap! 17:56:29 he hangs in in #openstack-security too 17:56:37 cool, thanks hyakuhei 17:56:40 tmcpeak, awesome, thanks. i might hit you up later for some info 17:56:49 elmiko: sounds good 17:57:02 lets go home? 17:57:05 #endmeeting