<div dir="ltr">Damn - i missed the meeting again :(. I will check the logs to catch up. Sorry</div><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Feb 20, 2014 at 10:26 AM, Clark, Robert Graham <span dir="ltr"><<a href="mailto:robert.clark@hp.com" target="_blank">robert.clark@hp.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-GB" link="blue" vlink="purple"><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Including the whole security group as there was significant interest during the OSSG weekly meeting.<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><div style="border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm 4.0pt">
<div><div style="border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0cm 0cm 0cm"><p class="MsoNormal"><b><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri","sans-serif"">From:</span></b><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri","sans-serif""> Sriram Subramanian [mailto:<a href="mailto:sriram@sriramhere.com" target="_blank">sriram@sriramhere.com</a>] <br>
<b>Sent:</b> 20 February 2014 16:35<br><b>To:</b> Abu Shohel Ahmed<br><b>Cc:</b> Clark, Robert Graham; Grant Murphy; Mats Näslund; Makan Pourzandi<br><b>Subject:</b> Re: OpenStack Threat Analysis activity - OSSG<u></u><u></u></span></p>
</div></div><div><div class="h5"><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal">Shohel,<u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">Friday 17.00 UTC works - though 18.00 UTC would work better for me. Are we meeting tomorrow?<u></u><u></u></p>
</div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">thanks,<u></u><u></u></p></div><div><p class="MsoNormal">-Sriram<u></u><u></u></p></div></div><div><p class="MsoNormal" style="margin-bottom:12.0pt">
<u></u> <u></u></p><div><p class="MsoNormal">On Wed, Feb 19, 2014 at 4:25 AM, Abu Shohel Ahmed <<a href="mailto:ahmed.shohel@ericsson.com" target="_blank">ahmed.shohel@ericsson.com</a>> wrote:<u></u><u></u></p><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<p class="MsoNormal" style="margin-bottom:12.0pt">Hi,<br><br>From our last week’s, it becomes clear that we need set up a way of working process in place<br>to take this activity forward.<br><br>So here are some ideas (Please also share yours):<br>
<br>1. WoW:<br><br> In the short time frame,<br><br> - First, We should define the purpose and the concrete output of this work ( which i think, most of us here has some ideas, if we still have question -<br>
we can clear that up before moving forward).<br><br> - Second issue is, how we can do threat analysis contribution in an effective manner. Here comes the collaboration issues within<br> this group. For this, I have created a free node IRC channel ##openstack-threat-analysis ( unofficial channel, as you can see from name).<br>
Lets start biweekly (15 days) meetings from this week. Lets vote for what is the suitable time for meeting for all of us.<br> I propose Friday at 17.00 UTC. However, i am happy to schedule the meeting based on most people preference.<br>
<br> In the longer time frame, we should think about setting up a Threat analysis working group (could be under OSSG) to perform threat modelling of all OpenStack components<br> - Define a clear out from this working group e.g., Threat documentation, Design guidance.<br>
- Engage developers and security minded people to the work.<br><br><br>2. Now on the technical side,<br><br> First and foremost, we should agree on a threat modelling process that can be applied for all OpenStack services and internal components. We have some ideas that<br>
can be applied for this work… Here is the link of our proposal :<br><br> <a href="https://drive.google.com/file/d/0B1aEVfmQtqnoMmpPZ3hmUHpBa1k/edit?usp=sharing" target="_blank">https://drive.google.com/file/d/0B1aEVfmQtqnoMmpPZ3hmUHpBa1k/edit?usp=sharing</a><br>
<br> and here are two concrete implementation of applying the threat modelling process…<br><br> Keystone over all : <a href="https://drive.google.com/file/d/0B1aEVfmQtqnobzB6M21uMEFXNUE/edit?usp=sharing" target="_blank">https://drive.google.com/file/d/0B1aEVfmQtqnobzB6M21uMEFXNUE/edit?usp=sharing</a><br>
Keystone Token-provider: <a href="https://drive.google.com/file/d/0B1aEVfmQtqnoejN1T1kybjlnMkk/edit?usp=sharing" target="_blank">https://drive.google.com/file/d/0B1aEVfmQtqnoejN1T1kybjlnMkk/edit?usp=sharing</a><br>
<br> (These are work in progress documents, so by no means provide a complete picture)<br><br> Lets discuss what do you guys think about the Modelling steps and its applicability with OpenStack (e.g., Keystone)<br>
<br><br><br>Thanks,<br>Shohel<br><br><u></u><u></u></p></blockquote></div><p class="MsoNormal"><br><br clear="all"><u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p></div><p class="MsoNormal">-- <u></u><u></u></p>
<div><p class="MsoNormal">Thanks,<u></u><u></u></p></div><div><p class="MsoNormal">-Sriram<u></u><u></u></p></div></div></div></div></div></div></div><br>_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><div>Thanks,</div><div>-Sriram</div>
</div>