Security Working Group meeting today

Joseph Reynolds jrey at linux.ibm.com
Thu Nov 12 06:24:02 AEDT 2020


On 11/11/20 7:58 AM, Joseph Reynolds wrote:
> This is a reminder of the OpenBMC Security Working Group meeting 
> scheduled for this Wednesday November 11 at 10:00am PDT.
> Apologies if this is a duplicate email.

Here are the summary meeting notes.

> We'll discuss the following items on the agenda 
> <https://docs.google.com/document/d/1b7x9BaxsfcukQDqbvZsU2ehMq4xoJRQvLxxsDUWmAOI/edit>, 
> and anything else that comes up:
>
> 1.  Is OpenBMC ready to move from root to an admin account?  See
>    https://gerrit.openbmc-project.xyz/c/openbmc/docs/+/33847
> <https://gerrit.openbmc-project.xyz/c/openbmc/docs/+/33847>

Please add an image feature for an admin account. It should work and 
play nicely with the existing phosphor-user-manager support and with the 
sudo package.


>
> 2.  The PAM_ABL module https://github.com/deksai/pam_abl
>    <https://github.com/deksai/pam_abl>is no longer supported.  We had
>    discussed using PAM_ABL to help prevent DoS.

No discussion.


> 3. The CSIS
> <https://www.cloudsecurityindustrysummit.org/#documents>published a
>    paper “A Case for a Trustworthy BMC
> <https://cloudsecurityindustrysummit.s3.us-east-2.amazonaws.com/a-case-for-a-trustworthy-bmc.pdf>”
>    that gives recommendations for security.  A section analyzes how
>    well the OpenBMC project meets these recommendations
> <https://cloudsecurityindustrysummit.s3.us-east-2.amazonaws.com/a-case-for-a-trustworthy-bmc.pdf#h.h0igu5dbvaun>. 
>
>    I’ve added this to the OpenBMC security wiki.

No discussion.  Plans are to track OpenBMC’s efforts in the security wiki.


Bonus item 4: Anton’s progress in running daemon processes as a non-root 
user. ANSWER:

Success making a sandbox that launched multiple daemons (BMCWeb  and 
ipmi-network) using less-privileged “namespace’d users” and using Linux 
groups to carry authority.  These daemons communicate with the rest of 
the system via D-Bus.

We also discussed if this daemon work has any tie-ins or complication 
with the work to login with a non-root admin or operator account. We 
also discussed what model / low-level design to use network user 
successfully authenticates: how to drop root authority.
>
> Access, agenda and notes are in the wiki:
> https://github.com/openbmc/openbmc/wiki/Security-working-group 
> <https://github.com/openbmc/openbmc/wiki/Security-working-group>
>
>



More information about the openbmc mailing list