#opendaylight-meeting: TWS 2014-06-16
Meeting started by phrobb at 17:05:05 UTC
(full logs).
Meeting summary
- OpenDaylight Security Analysis (phrobb, 17:05:29)
- https://wiki.opendaylight.org/view/CrossProject:OpenDaylight_Security_Analysis
going over this wiki page (colindixon,
17:05:54)
- was presented at the TSC on 5/29, then
suggested as a TWS topic (colindixon,
17:06:11)
- goal of this document is to record the the
current state security-related things in OpenDaylight and then
recommendations as to ways to improve/change things (colindixon,
17:11:22)
- went over several considerations w.r.t. OSGi:
chiefly (i) how to do bundle isolation/permissions and (ii) locking
down remote access to the OSGi runtime with a focus on Karaf
(colindixon,
17:13:03)
- review of controller plugins and their
security, e.g., HTTP vs. HTTPS, TCP vs. TLS, etc. (colindixon,
17:15:44)
- colindixon asks are there good high-level
statements we could make rather than (or in addition to) specific
per-plugin transports (colindixon,
17:18:01)
- one suggestion is that we recommend: (i)
encrypt all communication that leaves the controller and (ii) do
bidirectional authentication, i.e., controller authenticates itself
and the other end authenticates itself to the controller
(colindixon,
17:19:22)
- edwarnicke also points out that the table of
where we lie in terms of that is a good idea to track where we are
with respect to each plugin (colindixon agrees strongly)
(colindixon,
17:20:01)
- https://wiki.opendaylight.org/view/OpenDaylight_OpenFlow_Plugin:_TLS_Support
some information about adding TLS support OpenFlow Plugin (colindixon,
17:22:08)
- networkstatic suggests (and colindixon and
alagalah +1) that we should provide sample implementations of the
“right” security stuff for commonly used stuff, e.g., JAX-RS and
Netty (colindixon,
17:23:13)
- edwarnicke suggests that we try to get that
implemented once so that others can reuse the same code rather than
copy/pasting the samples (colindixon,
17:23:40)
- edwarnicke asks if there’s been any discussion
of the tension between the ease of having default login/passwords
for developers vs. how to make sure we don’t accidentally make it
easy for real people to use it and leave default passwords as a
security vulnerability (colindixon,
17:26:20)
- the answer is that it’s on their minds, but
there’s no decision yet (colindixon,
17:26:36)
- edwarnicke suggests having a default password
at launch, but require first login to reset it, that way if somebody
discovers the default password doesn’t work, you know things are
somehow bad (colindixon,
17:27:25)
- colindixon: zeroconf is hard (edwarnicke,
17:35:33)
- unidentifiedspeaker: But the IETF has a draft
that may tell you how ;) (edwarnicke,
17:35:50)
- talking about secure bootstrap of the
infrastructure: that is finding the devices and getting them
attached to the controller (possibly through multiple hops) in a
secure way (colindixon,
17:36:14)
- david lenrow asks if this is about
infrastructure devices or other endpoints as welll (colindixon,
17:36:47)
- answer is that it’s about infrastructure for
now and that will be made more clear (colindixon,
17:36:58)
- there is a discussion about how easy things are
to classify as infrastructure and not infrastructure with respect to
things like vSwitches and NFV; these difficulties are acknowledged,
but the idea seems to be you first boot/discover the physical
infrastructure and then you can boot/discover the virtual
infrastructure (colindixon,
17:38:34)
- controller clustering: discussion of securing
Infinispan/JGroups (colindixon,
17:41:21)
- colindixon points out that we will likely be
using Akka in addition to this and we need to look into this (Jan
Medved says we aren’t going to be using zeroMQ) (colindixon,
17:42:01)
- colindixon we should specify high-level intent
of what we should be doing for all of these points, so that as the
underlying technology changes we can do the right things
(colindixon,
17:45:57)
- colindixon asks if we have a way to enumerate
the ports we think OpenDaylight has open and what we think is
listening on them and how we think it’s secured (colindixon,
17:46:55)
- NMap scans against port 6633, 1830 and 6640 (+1
more to be documented) cause exceptions/bad behavior, see bugs
1174-6 (dfarrell07,
17:47:36)
- one way to build the list of ports would be
using a combination of things like NMap and netstat, it would be
great if we could automate building that list and then we could tell
when/if it changes (colindixon,
17:49:00)
- somebody (I forget who) suggested that we make
sure to do fuzz testing (colindixon,
17:51:34)
- somebody (I forget who) also suggested that we
figure out if we want to recommend different security approaches for
service providers vs. data centers, etc. (colindixon,
17:52:29)
- the overall recommendations at the end of this
document seem to mostly involve high-end (non-free) software to test
things and provide vulnerability analysis (colindixon,
17:57:32)
- colindixon says some of this seems antithetical
to open source software development and asks if there are different
ways other open source projects do things (colindixon,
17:58:25)
- we have coverity account for ODL (cdub,
17:58:28)
- we need a general security vulnerability
process (cdub,
17:59:53)
- we have security@lists.opendaylight.org as a
starting point (cdub,
18:00:04)
- we need an actual owner (cdub,
18:00:11)
Meeting ended at 18:08:13 UTC
(full logs).
Action items
- (none)
People present (lines said)
- colindixon (34)
- edwarnicke (8)
- cdub (8)
- networkstatic (6)
- phrobb (4)
- dfarrell07 (4)
- alagalah (4)
- odl_meetbot (3)
Generated by MeetBot 0.1.4.