All of lore.kernel.org
 help / color / mirror / Atom feed
* Security Working Group - Wednesday January 20
@ 2021-01-19 17:56 Joseph Reynolds
  2021-01-20 21:33 ` Security Working Group - Wednesday January 20 - results Joseph Reynolds
  0 siblings, 1 reply; 2+ messages in thread
From: Joseph Reynolds @ 2021-01-19 17:56 UTC (permalink / raw)
  To: openbmc

This is a reminder of the OpenBMC Security Working Group meeting 
scheduled for this Wednesday January 20 at 10:00am PDT.

We'll discuss the following items on the agenda 
<https://docs.google.com/document/d/1b7x9BaxsfcukQDqbvZsU2ehMq4xoJRQvLxxsDUWmAOI/edit>, 
and anything else that comes up:

 1.

    (email) Call for OpenBMC 2.9.0 release.

 2.

    Yocto email: Dropped openssl support for deprecated algorithms,
    including TLS 1.0 and TLS 1.1.  I (Joseph) believe we already have
    dropped TLS below TLSv1.2, but let’s take a look to see if we want
    any changes in this area.

 3.

    (gerrit review): Does anyone have a use case to allow customers to
    disable HTTPS?
    https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/39006
    <https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/39006>

 4.

    (gerrit review): Linux-PAM dropped support for pam_cracklib and
    pam_tally2.  These are being removed from OpenBMC usage because they
    are no longer available from yocto, but the function is not yet
    replaced.  See https://github.com/openbmc/openbmc/issues/3750
    <https://github.com/openbmc/openbmc/issues/3750>.


Access, agenda and notes are in the wiki:
https://github.com/openbmc/openbmc/wiki/Security-working-group 
<https://github.com/openbmc/openbmc/wiki/Security-working-group>

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Security Working Group - Wednesday January 20 - results
  2021-01-19 17:56 Security Working Group - Wednesday January 20 Joseph Reynolds
@ 2021-01-20 21:33 ` Joseph Reynolds
  0 siblings, 0 replies; 2+ messages in thread
From: Joseph Reynolds @ 2021-01-20 21:33 UTC (permalink / raw)
  To: openbmc



On 1/19/21 11:56 AM, Joseph Reynolds wrote:
> This is a reminder of the OpenBMC Security Working Group meeting 
> scheduled for this Wednesday January 20 at 10:00am PDT.
>
> We'll discuss the following items on the agenda 
> <https://docs.google.com/document/d/1b7x9BaxsfcukQDqbvZsU2ehMq4xoJRQvLxxsDUWmAOI/edit>, 
> and anything else that comes up:
>
> 1. (email) Call for OpenBMC 2.9.0 release.

Reviewed the security wiki item for this.


>
> 2. Yocto email: Dropped openssl support for deprecated algorithms,
>    including TLS 1.0 and TLS 1.1.  I (Joseph) believe we already have
>    dropped TLS below TLSv1.2, but let’s take a look to see if we want
>    any changes in this area.

dropped for HTTPS, not necessarily for SSH.  Related discussion:

Move away from dropbear SSH to OpenSSH?  Why?  See the new issue 
https://github.com/openbmc/openbmc/issues/3756 
<https://github.com/openbmc/openbmc/issues/3756>.  The group had general 
agreement to do this.


>
> 3. (gerrit review): Does anyone have a use case to allow customers to
>    disable HTTPS?
>    https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/39006
> <https://gerrit.openbmc-project.xyz/c/openbmc/bmcweb/+/39006>

Yes, we have use cases to disable the BMC’s HTTPS interface.  For 
example, a BMC controlled via the KCS interface (although these BMCs 
typically have their HTTPS interface removed entirely).

For the gerrit review: Allow HTTPS to be disabled, but don’t make it 
easy for the admin to remove their only access to the BMC (bricking).

The BMC’s service configuration manager 
(xyz.openbmc_project.Control.Service.Attributes at 
/xyz/openbmc_project/control/service/) shall issue an error message like 
“Cannot disable the %1{HTTPS,IPMI,etc} interface from a request via that 
same interface because that might brick the BMC.  Make the request from 
some other interface.”


An alternative to the above, we discussed having a behavior like “You 
cannot disable the last remaining interface”.


We discussed enhancing the BMC’s service configuration manager with a 
built-time option to disable the ability of the BMC admin from enabling 
and disabling the BMC’s interfaces.  For example, have a build-time 
block list (CANNOT_CHANGE_RUNNING_ATTRIBUTE_OF_THE_FOLLOWING_SERVICES) = 
“HTTPS” so any attempt to enable or disable HTTPS will be blocked and 
fail with a nice message like, “You cannot change the running state of 
the %1{HTTPS} service.”  In this way, the person who configures the BMC 
image can ensure that certain services are always running.


We discussed what happens to existing SSH sessions when SSH interface is 
disabled?

What happens to existing Redfish sessions when HTTPS interface is disabled?

What happens to existing IPMI LAN+ when IPMI/RMCP+ interface is 
disabled?  (RMCP.  No current use case to disable the KCS IPMI 
interface.  Compare with KCS restricted mode.)


>
> 4. (gerrit review): Linux-PAM dropped support for pam_cracklib and
>    pam_tally2.  These are being removed from OpenBMC usage because they
>    are no longer available from yocto, but the function is not yet
>    replaced.  See https://github.com/openbmc/openbmc/issues/3750
>    <https://github.com/openbmc/openbmc/issues/3750>.

This work is happening now.  Reviews appreciated. ADDED BONUS ITEMS:

5 The Intel security is planning to focus on penetration testing (an 
internal hackathon).


6 Update on Linux process isolation.

Still working on solutions for common cases.

Difficulties: file permissions, testing other people's code, wrong 
architecture need to be upgraded

Hard to take the first step because you’ll need dbus permissions working 
which is difficult.

Example: difficulties when the (downstream) nbd launches another process.

Idea: Have a new image feature to enable process isolation.  Grow over 
time to encompass additional BMC services.
>
> Access, agenda and notes are in the wiki:
> https://github.com/openbmc/openbmc/wiki/Security-working-group 
> <https://github.com/openbmc/openbmc/wiki/Security-working-group>


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-01-20 21:35 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-01-19 17:56 Security Working Group - Wednesday January 20 Joseph Reynolds
2021-01-20 21:33 ` Security Working Group - Wednesday January 20 - results Joseph Reynolds

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.