13:59:24 #startmeeting Security Group June 3rd 13:59:24 Meeting started Wed Jun 3 13:59:24 2015 UTC. The chair is LukeHinds. Information about MeetBot at http://wiki.debian.org/MeetBot. 13:59:24 Useful Commands: #action #agreed #help #info #idea #link #topic. 13:59:24 The meeting name has been set to 'security_group_june_3rd' 13:59:51 ok, we might be a little lite on numbers today, juan is on holiday, as is marcin I believe 13:59:57 Hi, Luke. Mike here: just trying to get Kapil in. 14:00:02 Hi Mike! 14:00:09 hello Mike and Luke 14:00:10 And Kapil's here, as well! 14:00:16 I will get the agenda stuff out the way 14:00:21 hi kapil 14:00:30 Ashutosh said he would be joiining 14:00:36 good! thanks 14:00:49 #topic last meetings minutes 14:00:54 #link https://wiki.opnfv.org/meetings/security/27052015 14:01:35 #info main action points were to get kapil and asutosh in to discuss SEC008 mapping to inspector. 14:01:45 #info luke to contact ODL 14:02:00 #info define work tasks for inspector 14:02:11 #agenda bashing 14:02:16 #undo 14:02:16 Removing item from minutes: 14:02:23 #topic agenda bashing 14:02:38 #link https://etherpad.opnfv.org/p/opnfv-sec-meetings 14:03:21 Inspector , OSVM, ETSI Wiki page filling and Project Mapping SEC-8) 14:03:36 #info LukeHinds: did anyone want to add to the agenda? 14:04:27 going, going, going.... 14:04:35 #agree agenda 14:04:48 #topic OSVM 14:05:21 #info quick one here, I am back in touch with Aric to finalise this (they were busy with the release) and hope to present the whole process to the TSC 14:06:00 #topic Inspector (and possibly ETSI mapping) 14:06:52 #info I had an action to contact the ODL. Next week David Jorm and Colin Dixon of ODL will join us to discuss Inspector and how that would work in a collaborative effort with opendaylight 14:07:05 #info David Jorm started the security group there 14:07:56 #info Colin Dixon is the TSC chair on opendaylight 14:08:17 so we have a good audience to pitch the benefits of inspector 14:08:56 #info ari and juan had to call off listing work items for inspector this week, as juan is on leave/ 14:09:10 I think he returns this week, so he will be there for next week 14:09:58 So now I think we can start to discuss SEC008 and how it relates to inspector 14:10:08 and the overall mapping effort. 14:10:09 is ashutosh on? 14:10:47 not sure he is. I have given him a few lessons on how to connect to web based irc, but he is finding it challenging 14:10:55 ok - I can start to discuss highlights of SEC008 and we can see how it can work with Inspector 14:11:15 sounds good 14:11:21 he helped me yesterday to do a Trial run...Maybe, he got busy 14:11:28 ashutoh is out of the office, so it might be that 14:11:36 hey there we go 14:11:38 right on cue 14:11:42 SEC008 is a an ETS INFV SEC project which kicked off in Jan'15 14:12:26 goal is to define network security functions for monitoring virtual networks 14:12:34 ashutosh please feel free to jump in 14:13:26 we called it Monitoring, others call it orchestration, some call it Management - we found in last meeting that the arch and flows were have developed there are similar to what others have been thinking about 14:13:30 Yes Kapil, I iad the VPN issues as I was describing yesterday, VPN does not allow to get to IRC 14:14:11 SEC 008 takes a comprehensive approach to security monitoring with different deployment scenarios 14:14:41 vEPC, Network Malware are some use cases 14:15:02 so network monitoring? 14:15:26 Thus, it takes a pragmatic approach in terms of what is available, what are the challenges for security monitoring in different scenarios 14:15:42 we have defined requirements for Security Monitoring, incl. active and passive monitoring of networks, securely bootstrapping agents, arch. and flows for provisioning 14:15:57 It could include vEPC, vIMS and also enterprise networks also 14:16:41 One question is whether this is more relevant to Moon, but I don't know enough about either Moon or Inspector to be sure, which is why I suggested inviting Ashutosh and Kapil. 14:16:47 We also describe thing like API-based monitoring and how to include use cases where certain interfaces are not exposed etc. 14:17:01 I think it might have a foot in both mike 14:17:27 we have Audit requirements as well 14:18:01 I have briefly looked at Moon and Inspector and both will have com correlation with SEC 008, but need to look into it more thoroughly 14:18:03 some security properties of integrity protection, non-repudiation and potentially confidentiality, 14:18:37 we identify key points that can used for developing audit trails 14:18:54 definitely from teh Security Controller 14:19:23 In addition, from Security Agents/VNFs 14:19:40 so i think this will be be the likely interplay here... 14:20:08 so, be good to start putting together specific requirements for Inspector - for instance, which elements we want to track Audits and access to a secure Audit DB 14:20:27 SEC 008 is still in the process of getting developed and there are rooms for addition including modifying the scope if needed, but both Moon and Inspector can certainly play a role in SEC 008 14:20:29 we do describe Audit-DB as part of teh overall system 14:20:39 moon would be the proj that would potentially implement the specs of SEC-008 14:20:53 correct - Moon would implement SEC008 14:21:10 inspector would be the project to insure upstreams produce the audit data needed to be complaint 14:21:41 As ashutosh said, we barely started 5 months back, so lots of opportunity to contribute - welcome! :) 14:21:47 #link here is a good little overview of inspector that ari / juan just did https://etherpad.opnfv.org/p/inspector_preliminary 14:22:33 key points: *not* a monitoring solution, and *not* a new standard for audit 14:23:03 We need to find a way to collaborate between Moon/Inspector and SEC 008 to keep them in sync 14:23:08 totally agree with that 14:23:13 its an effort to get others to produce the needed audit event meta data so that elements such as moon can process and act on those events 14:24:04 how I see this (which can be changed) is all would feed their requirements into inspector 14:24:17 v good write up - are you considering security requirements for audits in inspector 14:24:20 inspector will then work with upstream projs to get the needed implemented 14:24:40 how do you mean kapil? 14:25:02 well - depends on the purpose of the Audit 14:25:32 and, the threat model based on system arch 14:26:21 I guess that is up to the projects in opnfv. there will be some standard initiatives that will seek to address current known concerns. 14:26:55 one example being keystone, which lacks security reporting 14:27:55 from there if moon, or dpacc has a need, they can raise that inspectors jira and an approach is formulated and taken upstream 14:28:05 a dumb question - are you considering logs and traces as part of Audit trails? 14:28:48 not good idea 14:29:19 How about API-based Pub/Sub? 14:29:47 CADF 14:30:28 how its implemented needs to be dicussed with the upstream project (I guess, I need juan / ari to comment here) 14:30:43 for example, I don't think we can say 'hey, implement snmp v3 now!' 14:30:59 but we can say, 'please report when a user access x,y,z,' 14:31:04 are there any implementations of CADF out there? or, will this be first? 14:31:13 ceilometer 14:31:23 i likely spelt that wrong :) 14:31:38 #link https://wiki.openstack.org/wiki/Ceilometer/blueprints/support-standard-audit-formats 14:33:40 keystone is already starting to use CADF as well 14:34:08 #link http://docs.openstack.org/developer/keystone/event_notifications.html 14:34:13 lower part of the page 14:34:33 yes,it will filter service req 14:36:21 so the next steps will be Juan / Ari are going to define the work items for Inspector and get the tools set up (gerrit / jira) as the project only recently got approved. 14:37:10 maybe we need some usecase 14:38:11 and then we start to collate a set of initial needs (which will be the use cases) 14:39:14 hi luigi, are you on any other opnfv projs or do you want to contribute, its good to have you hear and we can find something if you have a wish to work on this. 14:39:50 its also fine if you just want to observe for now 14:40:28 mypleasure 14:40:37 :) 14:41:10 it is my first project 14:41:40 that's fine, please do keep coming here :0) 14:41:41 What is the path forward for Moon and Inspector project, do we have a POC that we can see? 14:42:07 And how do we align with SEC 008? 14:42:15 in a mutual way 14:42:23 For Moon I am not sure, i think they have a date on there wiki. Inspector is not a solution, so no POC as such 14:42:25 if u have work list, i am happy to pick up one 14:43:43 I think we first need to get inspector set up and see how requirements are entered and in what format. So that should happen over the next 2 weeks. 14:45:07 we then need to start to explore where inspector can help enact the needs of SEC-008 (or SEC-008 byproxy of opnfv projects) 14:45:41 I would encourage you guys to also put anything you can on the wiki 14:46:00 ofc, not confidential / un public ETSI drafts 14:47:11 but anything which would be useful. We started with the problem statements, but it seems SEC-008 has substantially more areas that require lots development 14:48:36 I put together the following rough wiki page #link https://wiki.opnfv.org/security/upstream/etsi 14:50:26 as an action point, I recommend you both think of audit events you would need to fufill sec-008 and these can be entered into the projects jira to be assessed to if they are possible in the current infra elements we have (being ODL, OpenStack) 14:51:19 but lets wait for the tools and work items to be defined, consider now a good oppounity to have visibility into this as its just starting 14:53:22 #info Moon OPNFV Rel 2 timeframe: 2S 2015 14:53:57 ok, we are almost at the end now...does anyone have any other business? 14:53:57 excellent...sounds good, Luke. thx for the hard work.. 14:54:12 thx, Luke. 14:54:19 my pleasure 14:54:57 thx,luke 14:55:34 ok, we can call it day, please all attend next week and welcome luigi. 14:55:49 minutes will go up later or tomorrow 14:55:52 #endmeeting