16:35:25 #startmeeting fedora_coreos_meeting 16:35:25 Meeting started Wed Nov 9 16:35:25 2022 UTC. 16:35:25 This meeting is logged and archived in a public location. 16:35:25 The chair is dustymabe. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 16:35:25 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:35:25 The meeting name has been set to 'fedora_coreos_meeting' 16:35:29 #topic roll call 16:35:32 .hi 16:35:33 dustymabe: dustymabe 'Dusty Mabe' 16:35:41 .hello spresti 16:35:41 spresti[m]: spresti 'Steven Presti' 16:35:48 .hi 16:35:49 gursewak_: Sorry, but user 'gursewak_' does not exist 16:35:58 .hi 16:35:59 gursewak: gursewak 'Gursewak Singh' 16:36:01 .hi 16:36:02 ravanelli: ravanelli 'Renata Ravanelli' 16:36:13 #hciar spresti[m] gursewak ravanelli 16:36:17 .hi 16:36:17 marmijo: marmijo 'Michael Armijo' 16:36:54 #chair spresti[m] gursewak ravanelli 16:36:54 Current chairs: dustymabe gursewak ravanelli spresti[m] 16:37:03 #chair marmijo 16:37:03 Current chairs: dustymabe gursewak marmijo ravanelli spresti[m] 16:37:15 .hello2 16:37:16 jlebon: jlebon 'None' 16:37:50 #chair jlebon 16:37:50 Current chairs: dustymabe gursewak jlebon marmijo ravanelli spresti[m] 16:38:37 sorry for the 5 minute late start today 16:38:40 #topic Action items from last meeting 16:38:48 #info there were no action items assigned last meeting! 16:39:00 No worries, I was running behind as well 16:39:31 #topic moby-engine (docker) maintenance in Fedora in question 16:39:36 #link https://github.com/coreos/fedora-coreos-tracker/issues/1291 16:40:15 .hi siosm 16:40:17 travier: Sorry, but user 'travier' does not exist 16:40:22 .hello siosm 16:40:23 travier: siosm 'Timothée Ravier' 16:40:26 looks like according to bgilbert the clock is running out on moby-engine 16:40:54 Maybe we need to nudge one the current sub maintainer to pick it up as primary one? 16:41:19 gotmax: do you have any knowledge of anyone planning to pick it up? 16:42:26 @copperi[m] @gotmax could one of you two pick it up so that it does not get orphaned? 16:42:42 s/orphaned/retired/ 16:42:46 This does not bind you in blood for updates 16:42:51 retired indeed* 16:43:07 travier: well, it is a commitment of sorts 16:43:08 it just avoids doing even more paperwork 16:43:30 i think they've known about it this whole time so if they wanted to pick it up they probably would have already 16:43:34 Well, I'd say that they are already admin of it so they're already a bit commited 16:44:06 eh, sometimes admin is gifted to you so you can solve problems because you know how, but don't intend to maintain the package 16:44:42 yep 16:44:45 well... 16:44:55 I can only speak for myself on this topic: I don't really have the cycles to pick up maintaining it. Don't know if anyone else from the community does or not. 16:45:22 Obviously it would make sense for the maintainer to be someone who uses moby-engine(docker) heavily (scratch your own itch) 16:46:43 ok we'll see what happens if anyone picks it up. 16:46:58 when's the auto-retire kicking in? 16:47:03 if no one does then we'll have to figure out what our users are going to do for f37->f38 transition 16:47:33 jlebon: i'm not sure what the policy is there, but I know it's not forevery 16:47:37 like 6 weeks or something I think 16:48:01 Orphan packages will be retired if they remain orphaned for six weeks. 16:48:04 https://docs.fedoraproject.org/en-US/fesco/Policy_for_orphan_and_retired_packages/ 16:48:24 wow - I was mostly guessing there, but was spot on 16:48:31 heh nice 16:48:42 huh, I guess most fedora users use podman? 16:49:05 ehh, I'm not 100% sure on that 16:49:10 well, a thing could have lots of users but doesn't translate to people wanting maintainership 16:49:10 this problem hasn't really hit users yet :) 16:49:12 or install docker from the "official" repos maybe 16:49:51 https://docs.docker.com/engine/install/fedora/ 16:49:54 this is where pinger would've been cool, to see the proportion of runtime usage 16:50:21 yeah - should we send a message to our devel list and maybe fedora devel? 16:50:46 hmm, if it gets retired i guess we could document how to install the upstream packages? 16:50:57 dustymabe: yeah that sounds reasonable 16:51:17 jlebon: yeah, but then we'd also need to test that often to make sure it continues to work 16:51:26 oh definitely 16:51:29 and we'd have no control over the source repo 16:51:47 i.e. we couldn't freeze on an older version if we needed to 16:52:07 it's of course not ideal, just a possible solution 16:52:11 yep 16:52:24 Hopefully the repos have all the versions? 16:52:28 I'll have to look 16:52:38 We would ship containerd still right? 16:52:43 anyone want to volunteer to send an email to the list (and cc fedora devel list)?" 16:52:52 travier: right, containerd maintainership got picked up IIUC 16:52:59 travier: seems like it: https://download.docker.com/linux/fedora/37/x86_64/stable/Packages/ 16:53:29 then we "just" need to write docs, announcements, etc... 16:53:33 I can see the headlines coming 16:53:38 feel* 16:53:49 i definitely don't like it :( 16:54:09 OK, I'll start a draft email for devel and will share it before sending 16:54:16 travier++ 16:54:16 jlebon: Karma for siosm changed to 1 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 16:54:22 thanks travier! hackmd would be great 16:54:25 travier++ 16:54:25 dustymabe: Karma for siosm changed to 2 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 16:54:45 🍪 16:54:47 #chair travier 16:54:47 Current chairs: dustymabe gursewak jlebon marmijo ravanelli spresti[m] travier 16:55:32 #action travier will send an email to coreos devel list and cc fedora devel to try to find volunteers to help with moby-engine maintainership in Fedora 16:55:42 #topic including audit in Fedora CoreOS 16:55:50 #link https://github.com/coreos/fedora-coreos-tracker/issues/461 16:56:09 travier: I think this one was you 16:56:27 oh yes 16:56:46 we're in a better place to add audit now but we're still missing a split or something 16:57:08 we also need to remake the ticket into a proper new package request to answer all questions 16:57:43 travier: can you catch me up? what changed recently that made this more achievable? 16:57:57 It's a good first task to do so I may pass that to someone else 16:58:29 the dependency on initscripts has finally been dropped 16:58:41 it's now pulling only the service binary 16:58:46 ok great 16:58:51 which is still bad but less so 16:58:57 much smaller 16:59:16 the remaining step is to split out all the python stuff 17:00:12 We/I'll have to re-do the new package request, but do we have any objection in general regarding adding this package? 17:00:22 So that I don't start something for nothing 17:00:31 it's in RHCOS already AFAIK 17:00:47 I don't. I've kind of wanted it from the beginning. 17:00:53 (and in all other Fedora Editions) 17:01:22 obviously dropping the python deps (if they still exist) is a pre-requisite 17:01:30 👍 17:01:42 any others have opposition to audit in general? 17:02:03 Nope. 17:02:18 hmm, i'm not seeing python listed at least in https://koji.fedoraproject.org/koji/rpminfo?rpmID=31832455 or https://koji.fedoraproject.org/koji/rpminfo?rpmID=31832456 17:02:34 so it's possible that's fixed already 17:03:05 shipping `service` is a bit awkward, but not sure it's worth blocking on it 17:03:23 agree it's not great but it's really small 17:03:37 #info we think we're in a better position to include auditd in FCOS now, though there is still some work remaining. travier will enumerate the remaining work and look to find volunteers. 17:03:44 is that accurate ^^? 17:04:04 if it's only used to stop the service, then I wonder if it could be replaced by a dedicated e.g. `auditd-stop` binary instead 17:04:18 shipping `service` makes it easy to use for other purposes 17:04:43 accurate 17:05:01 jlebon: yes, the better option that was suggested in the BZ too is to do that 17:05:11 but no one did the work so fart 17:05:13 far* 17:05:56 anything else to discuss on this topic? 17:05:59 my only concern is introducing `service` as a host API 17:06:33 We can task the "volunteer" on writing a bit of C for that :) 17:06:44 i'm not sure if there's a way to signal that clearly. move it outside of PATH and ship a tiny wrapper `auditd-stop` script that calls it? 17:06:59 jlebon: I guess we could do some postprocessing 17:07:43 right yeah, i mean just doing it ourselves if we can't reach something at the packaging level 17:07:43 i.e. mv service auditd-service-stop and then find/replace where it gets called (assuming it's in bash) 17:08:09 There's already an auditctl command so maybe it could be directly added to that 17:09:09 I think the "use case" is `service stop auditd` 17:09:13 or restart 17:09:19 so service should be the entrypoint 17:09:24 "should" 17:09:58 we could modify `service` to not accept a 2nd argument 17:10:09 or require the second argument be `auditd` 17:10:15 yes 17:10:18 then we wouldn't be introducing new host level API 17:10:22 for other uses 17:10:35 anyways lots of options here 17:10:43 anything else before we move to open floor? 17:10:46 man, that bugzilla has a lot of history 17:10:47 thanks for bringing this up travier 17:11:05 i think we need someone to do an investigation and see what the best path forward is re. `service` 17:12:21 jlebon: are you advocating for continuing the discussion here or are you OK with moving to open floor? 17:12:31 OK moving to open floor 17:12:36 #topic open floor 17:12:38 :) 17:12:42 +1 :) 17:13:16 #info We are hoping that the F37 release will happen next week. Please test out the `next` stream today and report issues as that will be coming to `testing` very soon. 17:14:07 i have a question for open floor. why is core 1000 and is that a good choice? 17:14:25 is that an appropriate question for here (and now). 17:14:30 fifofonix: i.e. the UID of the `core` user? 17:15:01 yes, it occurred to me that 'core' is defaulted with sudo privileges. and a lot of non-root containers use 1000. like keycloak. 17:15:42 if the objective of non-root containers is to limit the breakout potential. wouldn't it be better to be breaking out into an os id that is not sudo. 17:16:14 (this is probably a really dumb question) 17:16:28 no dumb questions, it's a good question 17:17:12 definitely not a dumb question 17:17:29 I don't know the exact history of why 1000 was chosen for core (though on a fedora desktop my UID is 1001, so close?) 17:17:45 i don't *think* we hardcode 1000. it's just the first available UID 17:17:48 you might want to look at using user namespace so that the UID picked inside the container does not matter much 17:17:59 I will say that I often put my workloads (containers) running as rootless under a secondary (non-core) user that doesn't have sudo access 17:18:43 travier: rightg 17:18:46 travier: right 17:18:57 Usually, if a container supports running as non root, you can pick any UID for it to run under 17:18:58 obviously easy to target a different uid and achieve whatever you want. my real question was are we in alignment with 'secure by default' 17:19:29 well, we can not account for all containers in the wild in the design 17:19:34 fifofonix: are you running your container as root (i.e. sudo podman run) or rootless (podman run)? 17:20:01 dustymabe: well, i have a whole diveristy out there in my own wild. 17:20:21 :) 17:20:37 what should we pick instead? 1001? 10000? 999? 17:20:49 I'm afraid there is no good answer 17:21:21 it seems that many people are choosing 1000 by default for their non-root container images that they provision to unsophisticated users like myself. 17:21:22 if I'm logged in as the core user (sudo privs and UID 1000) and I run a rootless container (podman run foo) then only UID 0 in the container maps to UID 1000 on the host. UID 1000 in the container maps to some other range of UIDs on the host (user namespaces). 17:22:37 Also note that running under UID 1000:1000 is different than running under UID 1000:1000 + sudo group + caps 17:22:40 if you run a container in rootful mode (sudo podman run) then you are already doing something a little less secure (IMO) and if they break out of that then they probably already have root? 17:22:42 right, sudo can give root because it's setuid but it would have to be run in the context of the host, not the container 17:23:19 IANA security person :) 17:23:55 (and there is SELinux) 17:24:02 yep 17:24:18 fifofonix: TL;DR, rootless containers you start can't actually run as host-level root from inside the container 17:24:25 even a rootfull container can not read your users file by default 17:24:31 fifofonix: maybe we can take this to the #fedora-coreos channel? 17:25:13 sure, or elsewhere. i'm still trying to figure out right place to raise things like this. would it have been better to start on #fedora-coreos? 17:25:37 fifofonix: yeah - you can pretty much drop anything into that channel 17:25:45 another good place could be the discussion forum 17:25:57 either one of those are good options 17:26:10 thanks 17:26:25 any other topics for open floor? 17:27:19 #endmeeting