fedora_security_team
LOGS
14:00:43 <Sparks> #startmeeting Security Team Meeting - Agenda: https://fedoraproject.org/wiki/Security_Team_meetings
14:00:43 <zodbot> Meeting started Thu Apr  2 14:00:43 2015 UTC.  The chair is Sparks. Information about MeetBot at http://wiki.debian.org/MeetBot.
14:00:43 <zodbot> Useful Commands: #action #agreed #halp #info #idea #link #topic.
14:00:46 <Sparks> #meetingname Fedora Security Team
14:00:46 <zodbot> The meeting name has been set to 'fedora_security_team'
14:00:49 <Sparks> #topic Roll Call
14:00:50 * Sparks 
14:04:00 <pjp> .hellomynameis pjp
14:04:01 <zodbot> pjp: pjp 'None' <pj.pandit@yahoo.co.in>
14:04:20 <Sparks> Oh good, we have someone.
14:04:24 <bvincent> .fas bvincent
14:04:25 <zodbot> bvincent: bvincent 'Brandon Vincent' <Brandon.Vincent@asu.edu>
14:04:31 <pjp> Sparks: He..he...:)
14:08:09 <pjp> bvincent: whas is ASU ?
14:08:15 <pjp> s/whas/what
14:08:47 <bvincent> pjp: Largest public university in the United States by enrollment.
14:09:03 <Sparks> Okay, lets get going.
14:09:13 <pjp> bvincent: Arizona state ?
14:09:17 <pjp> Sparks: Yep,
14:09:18 <bvincent> pjp: Correct.
14:09:21 <Sparks> #info Participants are reminded to make liberal use of #info #link #help in order to make the minutes "more better"
14:09:29 <Sparks> #topic Outstanding BZ Tickets
14:09:39 <Sparks> #info Thursday's numbers: Critical 1, Important 48 (+2), Moderate 379 (+3), Low 170 (+7), Total 598, Trend +12
14:09:45 <Sparks> #info Current tickets owned: 169 (~28%)
14:09:49 <Sparks> #info Tickets closed: 249 (+2)
14:10:03 <Sparks> That one critical bug has been there for a while.
14:10:10 * Sparks goes to update
14:10:15 * pjp checks what it is
14:10:28 <Sparks> rubygem-activesupport
14:10:48 <Sparks> jsmith: PING
14:10:58 <jsmith> Sparks: PONG
14:11:17 <pjp> Wow, there is -> http://fedorasecurity.com/ :)
14:11:25 * pjp didn't know
14:11:53 <Sparks> jsmith: Can you take a look at https://bugzilla.redhat.com/show_bug.cgi?id=905374 and see if this is something you could take care of?
14:12:36 <Sparks> jsmith: There appears to be a fix available from upstream.
14:12:42 <jsmith> Sparks: I can easily apply the patch -- but I don't know how to test, etc.
14:12:59 * Sparks shrugs.
14:13:14 <Sparks> I guess you can apply the patch and see who yells if it breaks something.
14:13:17 <bvincent> jsmith: PoC exists.
14:13:24 <jsmith> WORKSFORME.... I'll take care of it
14:13:36 <bvincent> #link http://ronin-ruby.github.io/blog/2013/01/28/new-rails-poc.html
14:17:32 <Sparks> #action jsmith to patch rubygem-activesupport as provenpackager (BZ 905374)
14:18:30 <Sparks> jsmith: Should we also start a non-responsive maintainer request as well?
14:18:38 <jsmith> Sparks: Please :-)
14:18:53 <Sparks> Who want to handle that?
14:19:45 <pjp> Sparks: non responsive maintainer against rubygem-activesupport ?
14:19:51 <Sparks> yes
14:20:00 <pjp> Sparks: okay, I'll do that
14:20:20 <Sparks> #action pjp to start non-responsive maintainer against rubygem-activesupport in EPEL6
14:21:24 <Sparks> It looks like the majority of the Important (priority HIGH) cases are owned (54 of 63) but these are the cases that should all be owned and being actively worked.
14:22:21 <Sparks> I'm as much at fault for letting these fester.  Can we set a goal of the beginning of June to have all old (circa 2014 and before) Important CVEs completed?
14:23:56 <pjp> Sparks: I think June end is good,
14:24:13 <Sparks> pjp: Okay, so three months.
14:24:20 <pjp> Sparks: Yep,
14:25:01 <Sparks> #action Team Goal: All important CVEs from 2014 and before should be fixed by the end of June.
14:25:15 <Sparks> #action Sparks to talk about the team goal to the list.
14:25:36 <Sparks> #action Sparks to complete the tickets of packages removed from EPEL earlier this year.
14:26:26 <Sparks> Anything else for the tickets?
14:26:40 <pjp> None for me,
14:27:58 <Sparks> #topic Open floor discussion/questions/comments
14:28:05 <Sparks> Anyone have anything?
14:29:11 <striker> Can I ask a question about Luks?
14:29:28 <Sparks> striker: Sure
14:30:08 <striker> Is it possible to have the default Luks encryption that Anaconda uses changed to a tougher cipher?
14:30:32 <Sparks> striker: Yes.
14:30:55 <Sparks> striker: Are you asking for the default cipher to be stronger or that you just want it to be on your systems?
14:31:04 <Sparks> striker: And what cipher do you think it's using?
14:32:59 <striker> Asking that it be stronger on the ISOs - I think the default is aes-xts-plain64?
14:33:49 <bvincent> striker: That is the default for cryptsetup - aes-xts-plain64:sha256 with 512-bit keys.
14:33:56 <pjp> striker: on the ISOs ?
14:35:02 <striker> I am sorry - I think I misunderstood what I was looking at.
14:35:09 <striker> Apologies for the noise.
14:35:24 <pjp> striker: No problem, :)
14:35:25 <Sparks> striker: No worries.  It's good to know.
14:36:26 <Sparks> Anyone have anything else?
14:38:19 * pjp none
14:39:31 <Sparks> Okay, we'll go ahead and end.  I'll try to follow up on the action items early next week before the meeting.
14:39:36 <Sparks> Thanks everyone.
14:39:39 <Sparks> #endmeeting