16:30:38 #startmeeting fedora_coreos_meeting 16:30:39 Meeting started Wed Oct 26 16:30:38 2022 UTC. 16:30:39 This meeting is logged and archived in a public location. 16:30:39 The chair is dustymabe. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 16:30:39 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:39 The meeting name has been set to 'fedora_coreos_meeting' 16:30:44 #topic roll call 16:30:46 .hi 16:30:47 dustymabe: dustymabe 'Dusty Mabe' 16:31:18 .hi 16:31:20 .hi 16:31:20 fifofonix: fifofonix 'Fifo Phonics' 16:31:23 lucab: lucab 'Luca BRUNO' 16:31:56 #chair fifofonix lucab jlebon 16:31:56 Current chairs: dustymabe fifofonix jlebon lucab 16:31:57 .hello2 16:31:58 jlebon: jlebon 'None' 16:32:07 .hello adamwill 16:32:08 adamw: adamwill 'Adam Williamson' 16:32:10 .hello mnguyen 16:32:11 mnguyen: mnguyen 'Michael Nguyen' 16:32:32 .hello siosm 16:32:33 travier: siosm 'Timothée Ravier' 16:33:08 #hcair adamw mnguyen travier 16:33:11 sigh 16:33:14 :) 16:33:18 #chair adamw mnguyen travier 16:33:18 Current chairs: adamw dustymabe fifofonix jlebon lucab mnguyen travier 16:34:02 ok let's get started here shortly 16:35:07 .hi 16:35:08 gursewak: gursewak 'Gursewak Singh' 16:35:12 .hello jasonbrooks 16:35:13 jbrooks: jasonbrooks 'Jason Brooks' 16:35:16 #chair jbrooks gursewak 16:35:16 Current chairs: adamw dustymabe fifofonix gursewak jbrooks jlebon lucab mnguyen travier 16:35:19 #topic Action items from last meeting 16:35:27 We had one action item: 16:35:33 * bgilbert will follow up on https://github.com/coreos/fedora-coreos-tracker/issues/567 re. VMware 16:35:51 * dustymabe doesn't see bgilbert around today, i'll re-action 16:36:05 #action bgilbert will follow up on https://github.com/coreos/fedora-coreos-tracker/issues/567 re. VMware 16:36:20 next topic: 16:36:27 #topic 20221101: CRITICAL OpenSSL vulnerability 16:36:41 .hi 16:36:42 bgilbert: bgilbert 'Benjamin Gilbert' 16:36:46 #link https://github.com/coreos/fedora-coreos-tracker/issues/1329 16:36:49 welcome bgilbert 16:36:54 #chair bgilbert 16:36:54 Current chairs: adamw bgilbert dustymabe fifofonix gursewak jbrooks jlebon lucab mnguyen travier 16:37:49 ICYMI the OpenSSL team announced the discovery of a CRITICAL security vulnerability. The fix will be released next Tuesday 16:38:37 which happens to coincide with when we would be switching our `testing` stream to F37 content (assuming F37 GA decision is "Go" on Thursday) 16:39:11 It's bad timing indeed 16:39:23 the open question is how we want to deal with these two competing events for Fedora CoreOS 16:39:34 Normally I would have said that we should make sure to get a testing release with the fix in it the day it's released but that time it does not work 16:40:06 we take security seriously, so obviously we want to add appropriate priority to the openssl bug (of which we don't know the exact details yet) 16:40:06 It kind of depends on what Fedora does 16:40:39 we have additional constraints that the rest of Fedora doesn't, which are that if we ship a release on a stream, we force users to upgrade to it 16:40:42 s/does/decides for the release date 16:40:55 yep 16:40:57 Regardless of what we decide here there are two things that will be a constant next week: `next` will continue to be on F37 content and `stable will continue to be on F36 content. 16:41:11 so Fedora as a whole can decide to ship without the fix, and the only question is whether it affects Anaconda 16:41:27 bgilbert: assuming they have automated updates enabled, yes (just wanted to qualify the "force" wording) 16:41:28 anaconda or anything anyone might do on a live desktop. 16:41:34 adamw: +1 16:42:02 but for us, I think it's bad form to force users to update through a rebase with possibly unknown bugs, in order to get a critical security update 16:42:22 so I think we need to consider slipping our rebase 16:42:31 critical untested security do indeed usually come with other bugs 16:42:35 it looks like in any case we'd have to respin all of stable+testing+next 16:42:46 security releases* 16:42:48 bgilbert: to counter that point: stable will continue to be on 36 so they could switch streams 16:43:03 of course, it's possible that the bug doesn't affect us, e.g. if it only affects TLS servers 16:43:12 ah, i see where you're coming from. the idea is you want a `testing` build that's 36 with the security fix, so people can use that if they don't want to go to 37 yet? 16:43:15 dustymabe: correct. but we do try to keep all streams usable and secure 16:43:20 adamw: right 16:43:26 bgilbert: indeed 16:43:38 that could be as simple as: ship the fix, then _immediately_ ship the 37 rebase 16:43:59 this is one option ^^ 16:44:13 .hi 16:44:14 aaradhak: aaradhak 'Aashish Radhakrishnan' 16:44:33 hi 16:44:34 lucab: and depending on the size of the fix, we may want it to bake a bit before shipping to `stable` 16:44:43 #chair aaradhak Nemric 16:44:43 Current chairs: Nemric aaradhak adamw bgilbert dustymabe fifofonix gursewak jbrooks jlebon lucab mnguyen travier 16:44:58 yes, so that week after we can have 36 + openssl fixed in stable and the 37 in testing with the fix again? 16:45:16 i'm assuming nobody is sitting on back channel info about the nature of the vuln? i know i'm not, unfortunately 16:45:38 we can also do a very short rollout on testing, i.e. a few hours. So that we get both better signal for stable and a cleared path for the F37 rebase. 16:45:52 adamw: I think we're on the same playing field, but I will point out that even if I did know I couldn't tell you :) 16:46:12 officially, anyway 16:46:23 or I would have to kill you :) 16:46:33 .fire adamw 16:46:34 adamw fires adamw 16:46:37 hah 16:46:42 :D 16:46:45 #recursion 16:47:21 haha 16:47:29 adamw: I am not 16:47:35 anyway, if it's something that breaks TLS security for ignition then that's bad 16:47:49 travier: Go crypto/tls isn't OpenSSL 16:47:50 ok - let's clear one hurdle - does anyone think we should ship the 37 rebase on tuesday (before the announcement of the ssl fix and also assuming F37 is "Go") 16:48:13 isn't go using the openssl backend in Fedora. Maybe only in RHEL? 16:48:14 dustymabe: let's qualify that 16:48:22 or only for fips? 16:48:29 travier: wait, there's an openssl backend? 16:48:48 yes, the only wait to get FIPS in go AFAIK :) 16:48:53 * dustymabe is glad to have experts here to guide this discussion 16:48:53 ahh 16:49:15 does anyone think we should ship the 37 rebase before we know what's in the OpenSSL announcement? 16:49:25 https://developers.redhat.com/blog/2019/06/24/go-and-fips-140-2-on-red-hat-enterprise-linux 16:49:40 but well, we don't use FIPS in fcos so we likely don't care then 16:50:08 https://developers.redhat.com/articles/2022/05/31/your-go-application-fips-compliant 16:50:11 ...ah 16:50:28 it's crazy but it's fips anyway so... 16:50:44 right. yeah, we don't support FIPS in FCOS: https://github.com/coreos/fedora-coreos-tracker/issues/302 16:51:54 https://developers.redhat.com/articles/2022/05/31/your-go-application-fips-compliant > this one seems to confirm that this is not the case on Fedora so we should be good for ignition 16:52:02 ok - there is more to discuss on this topic but let's clear one decision so we can further the discussion 16:52:06 what else do we have in the boot logic using openssl? 16:52:39 if we have nothing directly at risk, then we can "just" follow the Fedora release schedule 16:52:40 travier: I don't think boot vs. runtime really matters? FCOS doesn't use separate bootimages like RHCOS does 16:52:45 we do support grabbing the `rootfs` from a remote 16:52:52 +1 dustymabe 16:53:10 boot logic was a shortcut indeed 16:53:41 but yeah, most of our network code is Go or Rust 16:53:49 I think trying to thread the needle of if we want to ship this or not might cause us more grief than it's worth. I'm just assuming we're going to want to ship it. However I do think it's enlightening to go through the exercise of thinking about what uses OpenSSL. 16:54:18 we have some curl commands somewhere in dracut scripts maybe? 16:54:19 I'd prefer shipping the openssl update first (whatever that is) and then doing the F37 rebase for testing 16:54:22 interestingly, the rootfs fetch is written to not have to care about TLS integrity 16:54:23 I'd hate to do the analysis and then be wrong about it 16:54:30 bgilbert: good point 16:54:34 (though RCE is obviously still relevant) 16:54:51 anyway I'm going to throw out a proposal 16:54:52 #proposed assuming F37 GA is Nov 1st we will hold the `testing` rebase to F37 content one week while we ship security updates for the recently announced OpenSSL CVE. 16:55:03 how would shipping the update + then the rebase work? 16:55:19 users might potentially have a systemd service that curls something, so I think we have to prioritize any client-side fixes 16:55:21 travier: ship the update next week, ship the rebase the following week (for `testing`) 16:55:22 lucab: ^^ 16:55:51 so we delay if fedora does not delay? 16:56:02 travier: what part specifically? the timing of the rebase? 16:56:12 gaming this out: worst case, there's a large code fix, we're affected, we decide to slip. we build next/testing as soon as the fix hits bodhi, 24 hour rollout, then we ship a stable update. throw in 24 hours for pipeline problems and we've used up the whole week. 16:56:17 yes, as dusty said I assume? 16:56:18 travier: correct - as bgilbert mentioned we are in a bit more control of our users updates, so I think it can make sense to differ here 16:56:27 intermediate case, we can ship to all channels at once. best case, we don't even have to care. 16:56:31 s/channels/streams/ 16:56:53 bgilbert: +1 16:57:04 in general I agree that we should delay our rebase to 37 if the issue is significant enough 16:57:10 the current proposal is for `testing` stream only - obviously once we make this decision we can talk about the other streams 16:58:03 +1 for proposal. end users using ssh will use openssl right? 16:58:15 bgilbert: "we don't even have to care" -> can you clarify that? 16:58:43 fifofonix: not sure how much of openssl is used in openssh 16:59:03 jlebon: the example I gave was that the bug is in TLS server-side code. arguably we're unaffected in that case 16:59:16 as I said I think we will be forced to make updates on all streams with the openssl fix quite quickly, pretty much every user will be asking about that 16:59:16 I think ssh has its own crypto, but I think it does support auth via certificates (but I'm definitely no expert here) 16:59:22 fifofonix: yeah, depends where the problem is. crypto primitives yes, TLS no AFAIK 16:59:37 fifofonix only uses certificates 17:00:04 because of the potential for timing variations in a rushed three-channel staged release, I'm thinking if we decide we need to slip, we just slip by a full week 17:00:06 bgilbert: i meant schedule-wise. if it's best case, we ship it in next (because why not) and otherwise don't do an "async" release for testing/stable? 17:00:58 but arguably we don't need to decide in advance that we _will_ slip the release. we can wait to see what the problem is 17:01:09 the reason I'd like to assume the worst case here is because it allows us to take control of our schedule back, rather than relying on unknown information 17:01:23 jlebon: we'd normally have triple builds already lined up for the Tuesday release, right? so we wouldn't ship in any streams 17:01:29 on Tuesday 17:01:43 *Tuesday rebase 17:01:53 bgilbert: ahh gotcha. so don't delay the rebase and don't fast-track it anywhere. 17:01:53 dustymabe: true 17:02:04 jlebon: we have that option, yeah 17:02:12 So, our stance would be to delay the rebase to 37 unless it's a minor enough issue 17:02:34 travier: i'd prefer to not put off the decision on ^%^ 17:03:01 ahh gotcha. so don't delay the rebase and don't fast-track it anywhere. > ? 17:03:11 we'll need to communicate this (change in rebase date) to our users anyway and I'd rather not be confusing and say "unless it's not bad" 17:03:34 I don't feel 100% great about putting off a major scheduled release solely because some project made spooky Halloween noises 17:03:48 but point taken about scheduling certainty 17:04:00 dustymabe: given that disclosure is tuesday, there's still room in the week to adapt, 17:04:01 at least the release date isn't April 1st 17:04:31 jlebon: yes, we *can* adapt, but do we want to? 17:04:31 by the way https://twitter.com/mattdm/status/1585285318265262081 17:04:32 do we know if it's beginning of day or EOD? 17:04:56 upstream announcement is due by 1 PM ET 17:05:04 dustymabe: i'm not saying we rush to get things out, but it should be enough time to do the rebase as we would've 17:05:25 jlebon: there's more that goes into it than I'd like to sign up for 17:05:40 dustymabe: how so? 17:06:18 we could have builds for the triple ready to go, then have a go/no discussion, and possibly abandon them 17:06:22 bgilbert: one example.. assuming we ship a newer f36 then we'd get newer packages in `next` too 17:06:25 there'll be some delay while we're waiting for fixed packages anyway 17:06:56 dustymabe: and? 17:07:17 it's just a whole new cycle of possible test failures with new packages and investigations 17:07:41 right now F37 content has been frozen for weeks 17:07:48 dustymabe: but isn't that true whether or not we reserve the option to not slip? 17:07:50 all of that new content is going to come in as soon as GA ships 17:07:59 no 17:08:11 if we don't slip then we ship mostly GA content on Tuesday 17:08:14 lucab: +1, maybe the whole discussion ends up being irrelevant 17:08:29 dustymabe: we could hold content bumps until the rebase clears 17:08:29 if we do slip I think we'd need to ship latest f37 content (all 0-day updates included) 17:09:06 I think there are a lot of things we *can* do (our tooling is amazing). I think we should weigh cost vs benefit here 17:09:13 strictly speaking we could choose not to promote `next` and treat this one as an OOB release, but leaving that aside 17:09:37 bgilbert: indeed, that is an option. The content set gets so out of date at that point, though 17:09:42 yeah 17:09:56 package set has already been frozen multiple weeks as of today 17:10:05 oh, is your point that if we know we're going to slip, we could pull 0-day updates into next-devel in advance? 17:10:48 no, my point is that if we slip we will need to ship all the 0-day updates too, so let's give ourselves a week and not stress about juggling plates next week 17:10:58 but that's true anyway 17:11:18 if we slip, we will need to deal with 0-day updates 17:11:26 if we do not slip, we're basically already ready to go 17:11:37 right 17:11:37 reserving the option of not slipping doesn't require much extra work 17:11:57 except the proposed triple that we would throw away 17:12:03 correct 17:12:08 just some builds and some f-c-c reverts 17:12:18 well, one 17:13:01 i think i'm mostly saying that doing a major rebase is complicated enough already.. Let's not try to throw conditional logic ino it 17:13:23 we have update barriers to consider and the promotion comes directly from `next` (not `testing-devel`) etc' 17:13:37 given lucab's link above, i'd suggest we pick this up again in #fedora-coreos and the tracker tomorrow after go/no go 17:13:57 indeed - having that information would be useful 17:14:04 +1 17:14:06 yeah, and I'm trying to trade that off against allowing OpenSSL to drive our narrative around Fedora rebases 17:14:15 let's make an ad-hoc meeting tomorrow? 17:14:17 especially since this only matters in the case that Fedora decides not to allow that 17:14:23 +1 17:15:02 sounds good 17:15:21 when's the Fedora Go/No Go? 17:15:28 it will be late in the day that the meeting ends 17:15:35 i think it starts around this time and can go for hours 17:15:42 I don't like it as well but I also don't like bundling a vuln fix with a significant rebase 17:15:43 can't imagine why :-P 17:15:54 hah 17:16:04 we already had this issues with kernel vuln and version rebases 17:16:12 travier: yeah 17:16:41 so I'd prefer we slip one week to comfortably ship the fix and let the rebase happen after 17:16:45 travier: hmm. I don't remember this exact problem coming up before. Usually once we find out about a vuln the fix is already available 17:17:13 dustymabe: I think he meant having to backport a fix to a previous kernel stable series 17:17:15 one time we had a kernel vuln, but the fix was only in the package for the next kernel version 17:17:41 and there was a regression in the new kernel version 17:17:42 #info we will meet again tomorrow once Fedora decides if F37 will ship next week to discuss the scenarios here. 17:17:52 thus there was no option for users hit be the regression 17:18:36 travier: I think I see your point 17:18:41 took me a moment 17:18:54 move on to next topic? 17:18:55 if there is a regression in openssl and in F37 and we ship it at the same time as the 37 rebase, then there is no option for users to stay on F36 17:19:23 (with a fixed openssl) 17:19:29 travier: not exactly.. users will have the option of `stable` (F36 content) and/or rollback 17:19:43 but without the openssl fix 17:20:04 or layering. but those aren't usually in scope as preferred solutions 17:20:08 travier: I imagine we'll be shipping the fix to stable soon enough as well, but yes, after some trivial amount of time in `testing` 17:20:40 I think we can decide already that we'll slip by a week 17:20:41 bgilbert: agree.. at least users do have options though 17:20:49 minimum 17:21:01 thanks for the discussion, all. these are the decisions that make us a distro rather than a pile of code <3 17:21:23 travier: I think I agree, but we'll hash it out more tomorrow when we have the "Go/No Go" information 17:21:33 but let's see tomorrow. I think we should bring our discussion to the meeting tomorrow 17:21:34 #topic including audit in Fedora CoreOS 17:21:40 #link https://github.com/coreos/fedora-coreos-tracker/issues/461 17:21:48 We are becoming an edition with F37 17:21:54 our opinion will matter in this meeting 17:22:05 not sure if we have enough time to discuss this $topic properly 17:22:17 let's move it to next week 17:22:23 +1 17:22:27 #topic open floor 17:22:28 I'll remake a new ticket with the info and status 17:22:50 anyone with anything for open floor? 17:23:13 travier: hmm, that's an interesting angle. I'm not sure about blocking other editions because of our additional constraints though 17:23:26 should we coordinate when to meet tomorrow? - should we just say to watch the other meeting (happens in IRC) and then convene in #fedora-coreos after decision has been made? 17:23:40 not saying we'll block editions, just saying that we'll share our perspective 17:23:45 other* 17:24:11 i'm +1 to sharing perspective, but also educating people on the ability of our tooling and the power of our streams model 17:24:19 dustymabe: once the decision comes down, let's give 30 or 60 minutes notice in #fedora-coreos before discussing? 17:24:35 travier: yeah, indeed 17:24:51 to let them know that it's not a big deal if they do decide to ship, our users still have options with `next` F37 and `stable` F36 17:25:02 dustymabe: disagree 17:25:13 bgilbert: +1 to 30 to 60 minute window (will try to make ti start on the half or turn of an hour 17:25:35 let's not use the educational opportunity to be misleading about how to engage with the FCOS update model 17:26:03 i.e., it's better to say that FCOS will slip if necessary than to say "here are the things you can do to work around our decisions" 17:26:58 i.e. letting people know that "if you want f37 you can find it over here on the `next` stream and here are the implications of that" isn't something we should do? 17:27:11 oh, that's what you mean by options 17:27:19 I'm approaching that from a different perspective: we'll share the risks we have to consider and then discussion we've had 17:27:29 dustymabe: sorry, yeah, +1 17:27:46 yeah, I mean at the end of the day if someone is unhappy that we'd slip a week we can just tell them you can already get what you want 17:27:51 right 17:27:55 travier: wfm 17:28:15 As Ian McLeod would say: "I think we're all in violent agreement here". 17:28:30 I'm trying to find the time it's scheduled but I can not so far 17:28:36 :) 17:28:55 Ben Cotton: usually puts out an email 17:29:04 #link https://calendar.fedoraproject.org/Fedora%20release/#m10352 17:29:15 #undo 17:29:15 Removing item from minutes: 17:29:24 last week it was at 1700 UTC in #fedora-meeting. 17:29:29 #link https://calendar.fedoraproject.org/Fedora release/#m10352 17:29:33 #undo 17:29:33 Removing item from minutes: 17:29:40 argh. you'll have to paste it manually 17:29:47 I assume it will be the same time this week 17:30:21 bgilbert: that first link works for me 17:30:36 weird, I'm getting a server-side error on the %20 17:31:11 anything else for open floor ? 17:32:19 #endmeeting