[Openstack-security] Secure Logging Recommendations

Nathan Kinder nkinder at redhat.com
Thu Jun 12 17:53:02 UTC 2014



On 06/12/2014 12:37 AM, Kuvaja, Erno wrote:
> Hi all,
> 
>  
> 
> I do agree with Bryan that it would be better not to log point 2 at all
> and I would suggest that if we provide this functionality to turn such
> on we should also make those logs at that point root/admin readable only.

I would really prefer that we just don't have an option to allow logging
of things like credentials (passwords/tokens) in the first place.  This
seems like something that we should be firmly against.

> 
>  
> 
> I would also like to add an item to Sensitive/Confidential data list.
> One should never log any URI or full request object. These might contain
> user sensitive information like credentials, data locations etc.
> 
>  
> 
> Just a side note on the log levels. Lots of OPS are telling that
> currently getting anything valuable from the logs, they need to run the
> services on DEBUG log level. Based on this I really like the statement
> that DEBUG level should still never compromise the security of the
> information.

+1.

> 
>  
> 
> -          Erno (LP: jokke)
> 
>  
> 
> *From:*Bryan D. Payne [mailto:bdpayne at acm.org]
> *Sent:* 11 June 2014 17:00
> *To:* Paul Montgomery
> *Cc:* openstack-security at lists.openstack.org
> *Subject:* Re: [Openstack-security] Secure Logging Recommendations
> 
>  
> 
> Paul,
> 
>  
> 
> I really like this.  Here's a few additional thoughts:
> 
>  
> 
> 1) On the implementation side, doing this in Oslo seems like a good
> plan.  At least doing as much of the security sensitive filtering stuff
> there.  This is something we are basically asking all projects to do, so
> Oslo is the right answer.
> 
>  
> 
> 2) On this point:
> 
>  
> 
> "If confidential/sensitive data MUST be logged for root cause analysis,
> create an Oslo Config setting that disables security features, vividly
> informs the operator of this fact and make sure that the description
> accurately describes that this option should not be used for normal
> production purposes."
> 
>  
> 
> I think that it would be nice if we just didn't do this at all.  But, I
> understand the realities and we are likely to be more successful in our
> goals here if we can accommodate something like this.  To that end, I
> could say that when the system is operating in this mode, we
> should prefix EVERY log line with a short string that makes it clear
> that this mode is for debug/test and that it shouldn't be used for
> production purposes.
> 
>  
> 
> 3) CADF is interesting and appears to be getting some traction.  I am
> not too familiar with this standard, though.  It may be useful to have
> these logging guidelines reviewed by someone who has more familiarity
> with CADF to make sure that everything lines up nicely.
> 
>  
> 
> 4) OSSG hasn't traditionally been through a process of "blessing"
> a document such as this.  However, I would argue that it would be a good
> idea for us to figure out how to do this.  I think that providing
> guidelines such as this are a valuable "next step" towards increasing
> influence and interactions with the dev teams.
> 
>  
> 
> Cheers,
> 
> -bryan
> 
>  
> 
>  
> 
> On Fri, Jun 6, 2014 at 8:00 AM, Paul Montgomery
> <paul.montgomery at rackspace.com <mailto:paul.montgomery at rackspace.com>>
> wrote:
> 
>     I created a first pass document describing some potential solutions
>     to OpenStack sensitive data logging leaks (such as credentials or
>     auth tokens):
> 
>      
> 
>     https://wiki.openstack.org/wiki/Security/Guidelines/logging_guidelines
> 
>      
> 
>     I would appreciate reviews and discussions in order to gain approval
>     of the OSSG and the security-minded community before making
>     recommendations to other projects (especially in the "Possible
>     Implementation Options" section).
> 
>      
> 
>     Thanks!
> 
>     ---paulmo
> 
>      
> 
> 
>     _______________________________________________
>     Openstack-security mailing list
>     Openstack-security at lists.openstack.org
>     <mailto:Openstack-security at lists.openstack.org>
>     http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
> 
>  
> 
> 
> 
> _______________________________________________
> Openstack-security mailing list
> Openstack-security at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
> 




More information about the Openstack-security mailing list