17:02:29 #startmeeting security 17:02:31 Meeting started Thu Nov 17 17:02:29 2016 UTC and is due to finish in 60 minutes. The chair is tmcpeak. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:02:32 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:02:32 #chair hyakuhei 17:02:35 The meeting name has been set to 'security' 17:02:36 Current chairs: hyakuhei tmcpeak 17:02:36 o/ 17:02:41 o/ 17:02:44 lol sorry 17:02:50 looool 17:02:51 I'm broken 17:02:52 I'm stupid and tmcpeak is an enabler 17:02:53 o/ 17:02:59 o/ 17:03:02 #agenda https://etherpad.openstack.org/p/security-agenda 17:03:04 o/ 17:03:12 #link https://etherpad.openstack.org/p/security-agenda agenda :) 17:03:14 man. 17:03:16 I'm surprised the meeting even worked over there 17:03:21 vds hi! congrats on your first OSSN! 17:03:21 thank you sigmavirus 17:03:26 +1 17:03:38 hyakuhei, thx! 17:03:53 You're welcome :) 17:05:03 tmcpeak can you roll the first few topics while I clear something up? 17:05:11 yep 17:05:26 #topic Syntribos 17:05:33 unrahul: 17:05:42 saw your release announcement on ML 17:05:43 :) 17:05:43 hey tmcpeak 17:05:44 congrats! 17:05:52 yup.. thanks ! :) 17:05:57 +1 17:06:04 finally we released a version through openstack CI.. 17:06:15 awesome 17:06:25 Good job unrahul! 17:06:36 wd unrahul 17:06:41 We are still continuing our discussions/design sessions on what all things we should add to the tool.. 17:06:50 thank you hyakuhei capnoday sigmavirus and lhinds :) 17:07:01 Anything need reviewing atm unrahul ? 17:07:16 we have added a few tests like json depth limit and user defined tests 17:07:30 nop hyakuhei .. nothing for now.. 17:07:37 Excellent :P 17:07:46 if anyone can suggest any tests to be added to the tool, that would be great.. 17:07:58 other than than.. we dont have much for this week.. 17:08:09 unrahul: you guys have that recorded demo Rob shared in his talk anywhere? 17:08:23 might be good to write a shareable blog post with that linked to demo to people that are interested 17:09:07 we will do that.. tmcpeak .. as we are redesigning the template schema, thought we would come up with a blog after that is finalized and version is released in few weeks.. what do u think ? 17:09:31 either way :) 17:09:43 neat.. 17:09:45 just nice to get something easily consumable to share but no rush 17:10:03 so thats it guys from us .. yup tmcpeak .. :) 17:10:22 cool 17:10:27 #topic OSSN 17:10:31 lhinds: o/ 17:11:01 not much new, vds did a great job, but we did not publish as it turns out even though it was marked as OSSN, there was no remediation. 17:11:07 it was a pure code patch 17:11:21 ahh ok 17:11:24 well good practice :) 17:11:27 oh well, it got vds up to speed though, so we have another valued author on the team 17:11:41 :) 17:11:56 other then that, I need to make some gentle prods of tmcpeak and hyakuhei over your embargoed notes. 17:12:02 lol 17:12:06 Is my one good now mate? 17:12:23 :) I'll put it on my calendar for tomorrow 17:12:55 I think so, check the latest, I made a comment on one, but they are super close hyakuhei 17:13:23 I also have not had a chance to work on the notes API again yet 17:13:37 will hopefully have some time freed up over xmas to get it in shape. 17:13:46 that's it for da notes 17:13:50 ok cool. 17:14:09 lhinds are we happy with the google docs for embargos? 17:14:17 and just doing the clunky LP pastes for now? 17:14:21 yeah that seems to be working well 17:14:24 hyakuhei: I think so yes 17:14:40 that way we can grammar nits, and then share with cores on LP 17:14:48 cool 17:14:56 I always need lots of help with grammar :P 17:15:04 anything else on notes? 17:15:11 nop, thats it 17:15:43 sweet' 17:15:47 #topic Blog 17:16:19 looks like we could use one for security review 17:16:33 I also need my OSSN post merged 17:16:35 and hyakuhei has apparently written himself a note about LF Badge 17:16:42 lhinds I'll look at that now 17:16:49 thanks hyakuhei 17:17:12 hyakuhei: no pressure though, as its a time agnostic post. 17:17:55 did they get any nice stage pics of you guys? 17:18:17 shudder. I hope not 17:18:18 I don't know about nice but there were pics :P 17:18:41 i tried to get some on my phone but was sitting in the back row. so everybody looks like ants. 17:19:24 hah 17:19:50 allright, move on? 17:20:19 #topic Security Review 17:20:34 sup tmcpeak 17:20:36 capnoday: 17:20:45 forgot you've got a shiny new name 17:20:49 yeh bro 17:20:56 i got sick of you trolling me with underscores 17:21:32 :P 17:21:37 * gmurphy goes to check if capnoday is registered... 17:21:38 what's new with security review 0day? 17:22:15 nothing new from me, waiting on an update about what happened at the summit 17:22:24 oh, right 17:22:27 well let's do that now 17:22:40 * tmcpeak trying to remember 3 weeks ago 17:22:50 what happened at the summit? 17:22:51 there seemed to be lots of general interest 17:22:59 however I wasn't around Friday 17:23:09 hyakuhei: did the security review session happen Friday? 17:23:10 if so, how was it? 17:23:38 Fridays are always quiet 17:23:46 However we did have a design session mid week IIRC 17:23:58 That went well, the fundamental feedback was the same as it always is 17:24:04 "make it easier, make it faster" 17:24:22 where did we get with Kolla? 17:24:34 think we were part way through... 17:24:56 so I guess, realistically - what's our goal 17:25:18 capnoday was talking to their new PTL? 17:25:26 So 17:25:27 I think everybody would agree that this would be a nice thing to have, but 1) do we have the time and resources to do it, 2) will project teams commit the time and resources to do it with us 17:25:40 TBH I think what happened is that this fell by the wayside while capnoday transitioned company 17:25:56 I imagine we'll be able to speed things up again now 17:26:03 yeah ive been AFK for about 4 weeks 17:26:03 +1 17:26:20 that is resaonable feedback, given that the process is still evolving 17:26:34 1) we can but we might have to lower the bar. 2) TBD but it should be a requirement for VMT managed and eventually a project maturity tag 17:27:50 seems reasonable 17:28:02 lets continue as we are for the moment, i will write up the process and push it up for review 17:28:09 Till I find a new job, I have plenty of time to spare, if you tell how to start I'll be happy to jump in 17:28:17 vds excellent, thanks 17:28:29 the only issue is that most of it is in mine and hyakuhei 's heads atm 17:28:37 I see 17:28:54 but i will reach out to you when we have something and ask you for a look, it would be very handy to have someone fresh take a look 17:29:06 cool, thx! 17:29:37 I'm not sure that's true capnoday the stuff you put in review is good 17:29:40 and I wrote bloggy things 17:29:47 but we do need to pin down the process 17:29:48 true 17:29:59 we should get back with Kolla 17:30:04 Happy to 17:30:06 would be nice to have another project more or less completed 17:30:06 *but* 17:30:13 Kolla is a _terrible_ exemplar 17:30:27 Virtually unique among OpenStack projects 17:30:29 yeah, it's not typical but shows the process can work 17:30:36 for non-standard projects 17:30:37 That's dumb 17:30:44 Well not dumb 17:30:50 It's just not the time to prove that 17:30:59 ok, fair enough 17:31:01 but we owe them a completed review and will deliver 17:31:18 manila is interested in starting the process, as we mentioned a few weeks ago here and at the summit session, but we're pretty complex. 17:31:25 When we've got a process that works well for 80% of OpenStack we can then start looking at the outliers 17:31:30 tbarron complexity is ok 17:31:40 so we're studying the barbican stuff ... 17:31:44 The issue with Kolla is it's not a web service, not an api, not python etc 17:31:59 * tbarron nods 17:32:20 so focus on kolla-kubernetes :) 17:32:35 haha 17:32:47 tbarron what did you think from looking at the Barbican stuff? 17:32:53 We found some interesting problems there 17:33:02 but we do know the Barbican project 17:33:17 also had the benefit of being stuck in a room together all day 17:33:20 hyakuhei: i think i need to swap memory back in post-summit, sorry have been scrambling :) 17:33:40 hyakuhei: but mostly I need to find the right level of abstraction for manila 17:33:52 realistically Hangouts isn't quite as good 17:33:57 hyakuhei: with 20+drivers, lots of networking protocols, etc. 17:34:00 it's tenable but not as good 17:34:11 sahara would be a good next-project. it's architecture is very similar to barbican and we should have elmiko's support. 17:34:21 dave-mccowan: +1 17:34:27 dave-mccowan +1 17:34:33 capnoday thoughts? 17:34:57 sahara would be a good idea 17:36:55 allright 17:37:06 should we table it this week while capnoday warms up to his new gig? 17:37:21 I think so, I don't have cycles for it this week 17:37:32 ok cool 17:37:38 #topic Sec Guide 17:38:00 do we have anybody from Sec Guide? 17:38:01 tmcpeak +! 17:38:03 So my understanding was that Sicarie wanted to kee pdoing sec guide things 17:38:06 I thought this fell off our recurring 17:38:17 anyone who knows cinder enc well: please take a look: https://review.openstack.org/#/c/396795/ 17:39:36 i just pinged sicarie 17:39:53 Thanks lhinds 17:40:51 meanwhile.. 17:40:53 #topic MD5 17:41:03 lhinds: this was your baby you want to kick it off? 17:41:04 lhinds ^^ 17:41:07 sure 17:42:29 so there are quite a number of instances of hashlib.md5 being used in various project, while some of these might be negligible, MD5 is seen as weak now, and gets blocked by the Federal Information Processing Standard (FIPS) and others. 17:42:47 what's FIPS say about using it for non-crypto uses? 17:43:09 tmcpeak it just completely blacklists it. 17:43:13 ick 17:43:38 the idea is if your using it for check'suming, a collision attack could still happen 17:44:03 so I somehow swap out an object which has the same hash, and so is seen as trusted 17:44:04 so, I guess the example I have in my head is PyPI 17:44:40 is PyPI using MD5? 17:44:40 So far as I can tell, it's not an Approved Algorithm anymore for anything 17:44:44 PyPI has an MD5 of each package, just to validate the package was transferred correctly, even over TLS 17:44:45 theres a fairly small set of cases where it wold be ok to use MD5, but the issue there is that every time you would need hyakuhei standing up and explaining at length to the auditors about why md5 is ok in this exact situation 17:44:55 lol 17:45:02 That's basically my job. 17:45:03 but in addition to that there is real signing for security, which obviously uses good algos 17:45:10 It looks like PyPI is GPG signed 17:45:43 #link http://odetocode.com/blogs/scott/archive/2014/03/18/working-with-fips-140-crypto-standards.aspx 17:45:44 it's both 17:45:45 relevant 17:45:54 always MD5 signed and optoinally GPG signed 17:46:01 point is MD5 is not designed to provide any security 17:46:29 hmm 17:46:47 so that is a good example of one of thoses cases 17:46:59 so they are using integrity hashing for security though right? 17:47:16 no, just to prevent file corruption as I understand it 17:47:22 its insuring the object has not been swapped out (agree its a bad way of doing it btw) 17:47:31 They use it as a key name for an object 17:47:33 lhinds: I completely agree with you btw, get rid of MD5. I'm just saying we're going to get huge pushback 17:47:38 we have TCP for that :P 17:47:39 In swift at least 17:47:47 understood tmcpeak 17:48:05 so I have a suggesion.. 17:48:09 also waht about unit tests 17:48:20 does FIPS distinguish between production code and not? 17:48:31 * notmyname can talk about swift's use of md5, if you're interested 17:48:38 tmcpeak Nope 17:48:38 notmyname: please do 17:48:39 unit tests don't matter as you won't be runnning those on a live box I guess? 17:48:41 Kernel module 17:49:07 notmyname: also, do you think Swift, for example would be receptive to swapping out all MD5? 17:49:33 swift uses md5 for 2 things. one is to detect bit flips either in transfer of data from one server to another or from media degredation 17:50:18 which are valid cases.. 17:50:38 so we need hyakuhei to go and speak with FIPS :P 17:50:38 the other place we use md5 is for splaying data throughout the cluster: we md5(prefix + name of thing + suffix), take some prefix bits, and use that for index into a table to find the right drives to put stuff on 17:51:33 tmcpeak: in theory no, we wouldn't be opposed, but it would be a lot of work, have massive migration concerns, and we'd swap it for faster stuff, not "more secure" stuff 17:51:46 lhinds the problem is that when swift is deployed, the compliance auditors will have a sheet with a series of yes/no checkboxs, and one of them will be 'does it use banned crypt' 17:52:11 capnoday: yep. that's definitely an issue. we arent' using md5 for any cryptography 17:52:12 capnoday, yep that's the concern 17:52:25 capnoday, and they can block production greenlights 17:52:31 +1 it's not that it's really a security issue 17:52:39 it's that it will be a security blocker 17:52:39 im not saying that swift should do it, but it when arguing with checkbox monkeys, its best to pick your battles on stuff you really care about (like deploying AV to your cloud nodes) 17:52:41 which is dumb 17:53:58 IOW, does `grep -ri 'md5' path/to/source/dir` return anything? 17:54:27 so it seems, yes its viable / not *always* SEC related, but at the end of the day, it would be a blocker when it comes to tickboxes. 17:54:51 I'm afraid that soon EU companies will have the same issue with GDPR, it's not like you can discuss with this people, they only have a check list. 17:54:53 from my inexpert perspective, we'd likely consider stuff like blake2* if we switched 17:55:36 the scale of removing MD5 from OpenStack is huge but doesn't mean we shouldn't try 17:55:42 I think the code swap might not be too challenging, its just all the existing hashes stored in meta data used by different projs 17:55:51 Migration is the problem 17:55:54 yeah 17:55:55 tmcpeak: agree 17:56:03 I imagine for a fresh deployment it's got to be pretty trivial 17:56:12 hyakuhei yup 17:56:36 ok, well I can nominate myself for doing a first pass and getting launchpads up. 17:56:54 hyakuhei: for swift, it's no impact to the deployer. it's the code maintenance and the fact we actually cannot remove md5 totally. we must have that or we break every single existing cluster 17:57:07 lhinds: awesome, thank you 17:57:08 I will put them as a low (if they are non Security in use) so they don't get hit out as 'won't fix' 17:57:35 Figured as much notmyname - it's going to have to happen sometime I imagine. 17:57:48 I will put them in an etherpad so others can chip in. 17:57:49 hyakuhei: of course, the same thing's been said for 5+ years now ;-) 17:58:00 lol 17:58:05 allright guys, 2 mins 17:58:07 well that's pretty much time ppl 17:58:10 anything else? 17:58:32 that's it from me 17:58:42 #topic AOB 17:58:46 last call 17:59:03 allright 17:59:05 #endmeeting