17:00:48 #startmeeting security 17:00:49 Meeting started Thu Feb 4 17:00:48 2016 UTC and is due to finish in 60 minutes. The chair is tmcpeak. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:50 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:51 o/ 17:00:52 o/ 17:00:52 The meeting name has been set to 'security' 17:01:04 wut! 17:01:13 #chair hyakuhei 17:01:13 Current chairs: hyakuhei tmcpeak 17:01:15 hi 17:01:16 hi 17:01:17 heyo/ 17:01:21 hello 17:01:27 o/ 17:01:29 yo yo 17:02:07 #link https://etherpad.openstack.org/p/security-20160204-agenda 17:02:23 ha, its empty 17:02:38 not for long 17:02:48 that's for YOU to fix 17:02:50 ;) 17:03:02 o/ 17:03:03 OpenSource b*tches! 17:03:19 8D 17:03:23 hey dg_ thanks for pushing that TA work 17:03:34 hyakuhei: +1 17:03:45 and dg_ i owe you another review ;) 17:04:24 allright, let's roll it 17:04:36 elmiko that'd be great if you have time, i think the template and guidance are ready for review, process is still not even a draft 17:04:57 #topic Bandit 17:04:59 dg_: i'll make the time! 17:05:04 ty :) 17:05:05 tkelsey: roll it 17:05:32 o/ 17:05:40 or I can :) 17:05:49 I think we're well on our way to 1.0 17:05:53 do you have a checklist for what's needed for 1.0? 17:05:56 fantastic! 17:05:56 we'd really like to have that out in time for the summit 17:06:01 nice 17:06:07 bknudson_: we don't, but Christopher brought up the very valid point that we sould 17:06:09 *should 17:06:15 ++ 17:06:19 we probably ought to do them as tagged blueprints 17:06:27 so we are getting close to 1.0 feature set now 17:06:36 I started this but didn't update it: https://etherpad.openstack.org/p/security-bandit-1.0 17:06:43 so after this meeting I'll spend some time adding and tagging blueprints for work that needs 17:06:45 im thinking we should aim for a code freeze in March 17:06:56 bknudson_: awesome, thank you! 17:07:07 I'll probably rip from here to blueprints 17:07:12 and then release is in april before the summit 17:07:25 any objections ? 17:07:27 tkelsey: +1 17:07:38 1.0 or bust 17:07:46 :) 17:07:51 :) 17:07:53 tmcpeak: can you hold down the fort for a few minutes? I’ve got to jump on a call 17:07:55 that works 17:07:56 ^ sorry all. 17:07:57 it will be good to get Bandit in a nice steady state 17:07:59 hyakuhei: yep, will do 17:08:22 tkelsey: +1 for freeze and release 17:08:26 ok cool, so after the blueprints are up, anybody can feel free to assign to themselves, etc if they want to implement something 17:08:56 allright, anything else for Bandit? 17:08:59 FYI, i bumped bandit g-r from 0.13.2 to 0.17.3 17:09:02 awesome, so it will be upto core reviewers to make sure we honour the code freeze in march and only admit bug fixes 17:09:21 browne: oh, cool 17:09:23 thank you 17:09:40 tkelsey: yep yep 17:09:53 sorry if this has been covered in other meetings, but do we have a plan for deploying gate jobs as soon as 1.0 comes out? 17:09:54 allright, rolling on 17:09:59 we should also send that info on the code freeze to ML 17:10:03 awesome :) 1.0 should be very cool 17:10:05 ccneill: what do you mean? 17:10:09 browne: good point 17:10:17 browne: +1 yeah 17:10:19 browne: will you be willing to do that? 17:10:27 or I can 17:10:31 tmcpeak: ok sure 17:10:36 awesome 17:10:36 i.e. do we have contacts with folks who are interested, or people who we're interested in approaching, alerting them that bandit is coming 17:10:37 browne: cool 17:10:39 thank you 17:10:45 and to get ready for the awesome 17:10:47 :) 17:11:00 keystone has the awesome already 17:11:09 ccneill: I think we were going to do something like that, but it's stalled at the moment 17:11:18 tmcpeak: gotcha 17:11:22 ccneill: im not sure other than Keystone :) but the ML should be a good place to get attention 17:11:35 we're generally covering that under the banner of security project evangelism, although to my knowledge nobody has done anything on that front yet 17:11:46 sahara is marching towards voting bandit gate, and i know there is talk about trove adding it as well 17:11:47 tkelsey: yep, just didn't know if we were gonna try to do sort of an "alpha/beta" test 17:12:11 prior to wider adoption 17:12:21 elmiko: once we're happy with it we should really go on tour 17:12:28 allthethings 17:12:28 ccneill: probably not worth the admin side of it, a good code freeze/hardening cycle should be sufficient I think 17:12:55 tmcpeak: hehe +1 17:13:15 allright, let's do... 17:13:17 #topic Anchor 17:13:26 dg_: tkelsey 17:13:45 ccneill: we have integration tests that should server in place of alpha/beta build tests for the 1.0 17:13:56 CMC support is coming through in anchor 17:14:01 s/server/serve/ 17:14:09 all this talk of 1.0ing bandit has got me thinking - how far are we off anchor 1.0 17:14:24 tkelsey: cool cool 17:14:25 dg_: quite far but it’s achievable. I’d like to spend some time on that soon 17:14:32 sorry, trying to do both OSSP and OSQA meetings at once :S 17:14:33 ok 17:14:44 hyakuhei shall we talk offline on that one tomorrow? 17:14:47 yeah 17:14:58 ccneill: very bold ;) 17:15:11 elmiko: yep, it's a challenge lol 17:15:13 kk lets shelf that for the mo then. go anchor! 17:15:37 what's needef for Anchor 1.0? 17:15:40 *needed 17:15:53 hyakuhei ^^ 17:16:03 Quite a bit 17:16:10 So we need to stabilise the API properly 17:16:14 Documentation is quite lacking 17:16:17 severely so 17:16:30 Need to double check test coverage but that should be good 17:16:31 agreed 17:16:33 it builds thou, right? 17:16:42 Yeh 17:16:52 and you guys have consulted the api-wg guidelines just to help shore up api, right? 17:16:54 Got a fancy Dockerfile for that bro! 17:16:55 ;) 17:17:01 elmiko: pffft. 17:17:07 It exists to _support_ OpenSTack 17:17:08 * elmiko sadface 17:17:17 although that’s probably something that should be on the 1.0 list 17:17:36 i don't mind taking a gander at the anchor api though 17:17:44 there are api-wg guidelines? 17:17:47 yea 17:17:48 ! 17:17:49 #news 17:18:01 #link http://specs.openstack.org/openstack/api-wg/index.html 17:18:07 elmiko that would be awesome if you could take a look at the api - we are all rather close to the project 17:18:14 will do 17:18:25 given that Bandit and Anchor are already quite good, it would be awesome to get them in a mature steady state so we can concentrate on other cool stuff 17:18:30 It’s all very well and good for you to waltz in here now and say this elmiko! where were you when we were designing things :P 17:18:33 tmcpeak: exactly 17:18:42 Anchor has some really rich features now 17:18:55 hyakuhei: probably goofing off, at a guess 17:18:59 :P 17:19:07 Ok, that’s all I got for Anchor 17:19:12 cool 17:19:16 #topic OSSN 17:19:23 no nkinder today 17:19:44 #link https://bugs.launchpad.net/ossn 17:19:45 #link https://bugs.launchpad.net/ossn 17:19:48 ^ :P 17:19:51 very small queue 17:20:11 Where has that new one come from? 17:20:13 what's dis? https://bugs.launchpad.net/ossn/+bug/1493422 17:20:14 Launchpad bug 1493422 in OpenStack Security Notes "Remove partial fix of bug #1274034" [Undecided,New] 17:20:54 hello 17:21:01 hi 17:21:10 does this look related to OSSN to anybody? 17:21:27 no meeting today? 17:21:44 nsun: you might not be in the right place 17:21:47 tmcpeak: nope 17:21:59 ok hyakuhei good comment, we'll close if nobody responds soon 17:22:05 Ah it’s arp spoofing in Nova 17:22:14 we’ll see if they reply. definitely more context required. 17:22:18 yea, +1 hyakuhei on the comment 17:22:56 also what's the deal with the first one? 17:23:00 #link https://bugs.launchpad.net/ossn/+bug/1523646 17:23:01 Launchpad bug 1523646 in OpenStack Security Notes "Nova/Cinder Key Manager for Barbican Uses Stale Cache" [Medium,Confirmed] - Assigned to Dave McCowan (dave-mccowan) 17:23:49 looks like a bug, not particularly security related unless I'm missing something 17:24:21 assuming we agree on the need for an ossn, i need to update it. the patch has been merged now in nova and cinder, and has been backported in cinder as a security patch. 17:24:41 Yeah we do dave-mccowan - let us know when the OSSN is up for review 17:24:59 what are the security implications of it? 17:25:04 the original code caches one user's, and allows another user to then use them. 17:25:11 ^ tadaaa! 17:25:12 ahh ok 17:25:13 yeah 17:25:15 lol 17:25:17 that sounds legit 17:25:40 ok cool 17:25:45 so anything else for notes? 17:25:57 #topic Sec Guide 17:26:03 sicarie, elmiko 17:26:22 afaik, sicarie is still working towards the next pdf version 17:26:29 +1 17:26:39 we should roll another print run :P 17:26:41 otherwise we have a few small issues and bug reports that we have been working through 17:26:50 tmcpeak: that's what the new pdf is for 17:26:53 tmcpeak: yep, that's the goal, need the pdf to run the print version 17:26:54 ahh cool 17:27:13 with a nice big jacket with elmiko and sicarie's face on it 17:27:22 I have the perfect picture of "me" 17:27:27 haha, i'm not sure people could handle that... 17:27:55 elmiko is following up with someone who submitted a GIANT patch set - saw the first of the smaller ones come through 17:27:58 nonsense, nothing better to sell books than elmiko 17:28:04 pdesai is also working on some good bugfixes 17:28:07 lol 17:28:13 in short: we're making progress again :D 17:28:33 awesome 17:28:38 allright, anything else for guide?\ 17:28:45 nothing from me 17:28:46 i'm good - elmiko? 17:28:52 #topic Threat Analysis 17:28:54 dg_: 17:29:29 sorry, RL just happened, joys of being in office 17:29:49 anybody else want to talk about it? 17:29:56 first up, I have pushed another patch set 17:30:03 and replied to the reviews on patch set 3 17:30:10 (patch set 4 was a noop) 17:30:32 How does the stuff in review compare with what was discussed in SA? 17:30:46 in patch 5, the template and guidance is ready for review 17:31:10 the process is not, i need to talk to hyakuhei about it and try and write down what planned in SA 17:31:35 I think the template and guidance support the stuff you talked about in SA and will let us achieve the objectives 17:31:54 ok cool. I think I need to come to Bristol so we can iterate on this a few times then bounce it around the Security team 17:32:02 yeah, or i can come to wales 17:32:03 It’ll be end of Feb. 17:32:12 ok, we’ll try to make that work 17:32:15 ahh you're afk next week when im in wales anyway? 17:32:24 + anyone else who cares, obviously. 17:32:31 i'll be in Inverness in early march if you guys want to do a northern vaca? ;) 17:32:39 I'm not going to wales. 17:32:45 elmiko yeah we could do inverness 17:32:58 lol. Well fwiw I’m in seattle at the start of next week 17:32:59 \o/ 17:33:04 come meet me there dg_ 17:33:30 cant mate, im in wales 17:33:40 lol 17:33:47 I think that’s it for TA 17:33:56 one other thing 17:34:14 i had a play with diagraming tools - attempting to reproduce the sample from the blog 17:34:25 results of my experiment are on the etherpad 17:34:50 basically blockdiag is a bit broken and has a very steep learning curve, draw.io is awesome and google drawing might be a good option 17:35:22 does draw.io or google output to a nice format we can embed? 17:35:26 draw.io FTW o/ \o o/ 17:35:32 as long as we don't have to start over every time we want to make a change. 17:35:38 bknudson_: +1 17:36:00 draw.io outputs to proprietry XML which we could check in, but if draw.io went away we'd be left with a bunch of PNG and have to go away 17:36:00 I think draw.io can do pdf or png 17:36:10 k 17:36:15 yeh, it’s more about iterating on diagrams ccneill 17:36:22 blockdiag had great promise 17:36:37 but the initial level of effort required seems very high. 17:36:39 +1, I wanted to love blockdiag 17:36:42 hyakuhei: gotcha. yeah, it's not great for saving whole diagram state for future editing (outside their site) 17:37:06 as far as I've seen anyway 17:37:26 for comparison, it took me about 2 hours to reproduce the diagram in blockdiag, 11mins in draw.io and about 20mins in google 17:37:41 and it looked a LOT more readble in draw.io than in blockdiag 17:37:59 draw.io does have import / export, so that should work 17:38:04 well, lets make the decision to use draw.io on the understanding that if it goes away, we’ll have to invest effort re-drawing diagrams. Effort that blockdiag would have cost us anyway 17:38:11 bknudson_: sure. The question is if it goes away 17:38:30 hyakuhei good plan 17:38:34 nonsense, web apps are forever :P 17:38:40 for the moment i have said 'use a drawing tool, here are some....' 17:38:46 it's not google so maybe it will stick around 17:39:03 lol 17:39:25 allright, onward 17:39:31 #topic BYOK 17:39:35 what's dis? 17:39:38 #link https://openstack-security.github.io/mid-cycle/2016/01/15/mitaka-midcycle.html 17:39:42 bring yer own key 17:39:50 Scroll down to “Bring Your Own Key" 17:39:53 yes, yes, I mean who's bringing it? 17:39:57 User 17:39:58 to where will they bring it, etc 17:40:01 you are! 17:40:05 #link https://aws.amazon.com/blogs/aws/s3-encryption-with-your-keys/ 17:40:08 ;) 17:40:10 #link https://technet.microsoft.com/en-gb/library/dn592126.aspx 17:40:16 #link http://googlecloudplatform.blogspot.co.uk/2015/07/Bring-Your-Own-Encryption-Keys-to-Google-Cloud-Platform.html 17:40:21 All the cool kids are doing it 17:40:26 Barbican don’t want to do it 17:40:33 I want to make it a thing 17:40:39 So do a few barbicaneers 17:40:41 what's needed to do so? 17:40:50 Two bodies of work 17:41:08 1. To work crossproject to agree a set of header extensions so that services can be offered with BYOK 17:41:19 ‘keymat’,’keytype’ etc 17:41:35 No idea what they’ll look like but I’m going to try to run a design session on it 17:41:43 seems reasonable 17:41:44 what else? 17:41:59 2. Improvements to Castellan so that it can take keymat presented to the front end and use it in place of actual key fetching operations 17:42:10 Most services are moving towards using Castellan as their key manager 17:42:21 how much work is that? 17:42:25 So if we can make that ‘byok aware’ we don’t really need to add much logic 17:42:38 Depends how much of the original HTTP request gets passed through the middleware 17:42:51 It could be a really great feature for us to add though 17:43:01 currently castellan is a very thin wrapper/abstraction layer around barbican (or another) key manager impl 17:43:06 Tru 17:43:14 It can do KMIP too iirc 17:43:30 It doesn’t have to be castellan, we could put our own middleware in 17:43:32 i think you are correct, or those patches are in flight 17:43:40 but if services are using it anyway 17:43:41 hyakuhei KMIP support is WIP 17:43:51 it’s a nice place to add functionality 17:43:54 castellan may make sense, i just don't know the byok plans well enough to comment at a deeper level 17:44:13 This is an interesting opporunity for the Security Project to drive some code changes into other projects 17:44:26 yea, it's a cool idea. no argument from me there =) 17:44:28 I’ll try to get a blog post up about BYOK on its own 17:44:54 Going into what it might look like, the short is I don’t fully know and I don’t think it’ll get much traction until we get project cores in the same place to talk through the idea 17:45:08 makes sense 17:45:11 Is there a sensible place to create a X-project spec for something like this? 17:45:19 I mean we could try to discuss this on -dev 17:45:23 the cross-project spec repo =) 17:45:56 and, definitely bring it up on ML to get an agenda item for a cp meeting 17:46:41 or, ping thingee for more ideas. he has been doing an excellent job organizing cp efforts 17:47:04 #action hyakuhei to put together a spec and propose some ideas on -dev 17:47:21 thanks elmiko I’ll try to rope you into this early for feedback if that’s ok? 17:47:44 hyakuhei: definitely, would love to help 17:48:21 Great thanks! 17:48:24 So that’s all I had 17:48:46 allright next up 17:48:49 #topic Blog posting 17:48:57 anybody have anything they want to write? 17:49:14 BYOK! 17:49:21 lol 17:49:22 I’ll do something on the Security track for the summit 17:49:22 yes, yes 17:49:36 #action hyakuhei to write bloggy things 17:50:06 I should write something too 17:50:20 that's probably it for blog posts :P 17:50:21 So far I think it’s just Travis and I 17:50:25 reminder: we have a blog 17:50:33 Which is fine but I’d rather this wasn’t the HPE Security Blog 17:50:33 blogging is fun 17:50:46 So c’mon peoples! 17:50:51 i'd like to write something, but it would most likely be sahara related, is that acceptable? 17:50:56 Yup 17:50:58 k 17:51:01 for sure 17:51:13 So long as it’s related to a) Security b) OpenStack that’s fine. 17:51:22 It doesn’t have to be hardcore on either 17:51:34 yup, i was thinking a retro-spective of security enhancements that have been added recently 17:52:18 Sounds perfect 17:52:27 yeah that would be aweseome 17:52:48 bknudson_: a post about using Bandit in keystone would be sweet too if you have time for something like that 17:52:54 ok, just make a post and put it for review in the github repo? 17:53:18 I could try... I've got a lot on my plate already. 17:53:28 fair enough 17:54:30 allright 17:54:32 #topic AOB 17:54:35 anything else? 17:54:38 before we wrap 17:54:40 the draw.io "xml" format is embedded binary (base64). 17:54:41 dg_: quick question about the anchor api 17:54:52 http://blog.rackspace.com/openstack-mid-cycle-session-leads-to-collaborative-production 17:55:02 elmiko sure 17:55:08 we post this one on our external blog 17:55:27 sorry, busy with other stuff all the time. 17:55:28 That looked really good michaelxin 17:55:30 michaelxin: looks awesome! although I'm not thrilled with that doofy look on my face 17:55:37 so, i'm gonna go through the api and check it out. if i find anything that might be worth adding to the api docs, just go ahead and make a patch? 17:55:43 haha 17:55:52 some of my team-mates are already using a cut from that against me 17:55:58 tmcpeak: no... 17:55:59 elmiko yup :D 17:56:00 lol 17:56:00 oh, no 17:56:12 dg_: ack 17:56:21 it's ok, we have a history, I knew it would happen ;) 17:56:35 anyone wants OSSP sticker, send me your address to michael.xin@rackspace.com. We still have some left. 17:57:02 elmiko all patches welcome. unless they break the gate 17:57:10 dg_: sweet! 17:57:56 anything else? 17:58:14 * tmckay now knows why elmiko is never late for Sahara :) 17:58:22 lol 17:58:26 my secret is out! 17:58:40 maybe I should join the api working group, too 17:58:48 #action elmiko to review anchor api 17:59:10 just wanted to add that, thanks tmcpeak 17:59:14 allright 17:59:26 #endmeeting