16:31:15 #startmeeting fedora_coreos_meeting 16:31:15 Meeting started Wed Oct 4 16:31:15 2023 UTC. 16:31:15 This meeting is logged and archived in a public location. 16:31:15 The chair is dustymabe. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 16:31:15 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:31:15 The meeting name has been set to 'fedora_coreos_meeting' 16:31:21 #topic roll call 16:31:23 .hi 16:31:24 dustymabe: dustymabe 'Dusty Mabe' 16:31:40 .hello marmijo 16:31:42 marmijo: marmijo 'Michael Armijo' 16:32:03 .hello siosù 16:32:04 travier: Sorry, but user 'siosù' does not exist 16:32:05 .hello siosm 16:32:07 travier: siosm 'Timothée Ravier' 16:32:31 .hello mnguyen 16:32:32 mnguyen: mnguyen 'Michael Nguyen' 16:32:39 .hello aaradhak 16:32:40 aaradhak: aaradhak 'Aashish Radhakrishnan' 16:33:06 #chair marmijo travier mnguyen aaradhak 16:33:06 Current chairs: aaradhak dustymabe marmijo mnguyen travier 16:33:21 .hi 16:33:22 lorbus: lorbus 'Christian Glombek' 16:33:32 it's been a while o/ 16:33:33 #chair lorbus 16:33:33 Current chairs: aaradhak dustymabe lorbus marmijo mnguyen travier 16:33:36 \o 16:34:03 note if you want to bring something up today please add the `meeting` label to the ticket 16:36:10 #topic Action items from last meeting 16:36:17 #info there were no action items from last meeting 16:36:53 looks like we only have one topic today 16:37:03 #topic Handling of default users/groups 16:37:07 #link https://github.com/coreos/fedora-coreos-tracker/issues/155 16:37:17 .hello2 16:37:18 jlebon: jlebon 'None' 16:37:26 I can introduce 16:37:29 travier++ 16:37:29 dustymabe: Karma for siosm changed to 1 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 16:37:48 The context is summarized in https://github.com/coreos/fedora-coreos-tracker/issues/155#issuecomment-1688447446 16:37:55 as long as the proposal 16:38:28 Rpm-ostree based systems currently split the user and group definition in two parts, one coming from the image as part of /usr/lib/(passwd|group), which is read only, and one copied into /etc/(passwd|group) from /usr/etc/(passwd|group) to make it writable for system administrators. 16:38:37 To "merge" those two sources, we use nss-altfiles (nss module configured in /etc/nsswitch.conf) to lookup users in both places. 16:38:44 nss-altfiles adds complexity to the user/group lookup process and user/group creations on rpm-ostree systems and creates user experience issues. 16:39:04 The ideal future is that we are not using nss-altfiles anymore and instead all (system) users and groups are defined by systemd sysusers configuration files and read from /etc/(passwd|group). 16:39:44 travier++ 16:39:44 lorbus: Karma for siosm changed to 2 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 16:39:57 .hi 16:39:58 fifofonix: fifofonix 'Fifo Phonics' 16:39:58 .hi 16:40:01 ravanelli: ravanelli 'Renata Ravanelli' 16:40:20 I continue to find RPMs that don't ship a proper sysusers config, hopefully we have them all converted soon.. 16:40:29 lorbus++ 16:40:29 travier: Karma for lorbus changed to 1 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 16:40:45 #chair fifofonix ravanelli 16:40:45 Current chairs: aaradhak dustymabe fifofonix lorbus marmijo mnguyen ravanelli travier 16:40:53 #chair jlebon 16:40:53 Current chairs: aaradhak dustymabe fifofonix jlebon lorbus marmijo mnguyen ravanelli travier 16:40:56 We're getting close to the point where sysusers is used in all packages in FCOS 16:41:10 polkit landed recently 16:41:19 :) 16:41:46 For new systems, the migration will be "easy". The trick is for existing systems. 16:42:26 I have not fully checked yet but we might be able to rely on grpck & pwck utils to do the actual migration for us 16:43:08 So the goal of raising this here is to discuss if we want to do this, the timeline, potential blockers, opinions, etc. 16:43:41 * dustymabe has never used grpck or pwck 16:43:49 ahh neat, hadn't encountered those before either 16:44:31 definitely think the "migration" part needs to be done with care here 16:45:05 yes 16:45:06 proposal looks sane overall! 16:45:20 it might be something for F40, maybe with a change request? 16:45:30 so ignition would now write out sysusers fragments when a user requests a new group get added? 16:45:51 only for system users/groups 16:46:09 how does one know if a user/group is system versus non-system? 16:46:11 otherwise it can call useradd/groupadd like it does today AFAIK 16:46:43 the convention is UID < 1000 & nologin shell or `--system` option passed to useradd 16:46:54 and the Ignition spec has a knob for it 16:47:21 ok 16:47:30 SGTM 16:47:39 system (boolean): whether or not this account should be a system account. This only has an effect if the account doesn’t exist yet. 16:47:42 yeah, i don't think ignition strictly needs to change 16:47:44 https://coreos.github.io/ignition/configuration-v3_4/ indeed 16:47:59 i will certainly be happy to get away from altfiles and all the little corner case problems we've had because of it 16:48:12 but it does fit the model better if it just emits sysusers dropins 16:48:51 note that with this change we'll make passwd & group files local state for all systems where right now only the diff was 16:49:31 but we haven't been able to make it a consistent / better experience so far 16:49:54 travier: yes, but any new system users will get delivered by RPMs via sysusers fragments.. so that should be OK? 16:50:02 yes 16:50:09 #proposed The proposal to drop the use of nss-altfiles and replace with systemd-sysuers usage has no opposition. 16:50:17 I'll likely make a change as I want to do this for Silverblue at the same time. 16:50:22 yeah, i don't think that matters too much. as soon as it's touched, it's stuck in local state mode anyway 16:50:36 +1 - would IoT want to do the same? 16:50:41 probably 16:51:05 which means we probably need to think less about our CoreOS facilities and more about how to implement the migration across the board 16:51:42 #action travier to create a change proposal for F40 for switching away from nss-altfiles for OSTree based systems 16:52:04 or I can switch the AI to someone else 16:52:16 anybody opposed to the #proposed? Want to vote? 16:52:22 travier: thanks for looking at this! 16:52:29 +1 16:52:40 +1 16:52:44 let's vote before I create a change? 16:52:44 +1 16:52:45 +1 16:52:52 (Im' +1 since I'm porposing) 16:53:05 (I'm +1 since I'm proposing)* 16:53:25 #agreed The proposal to drop the use of nss-altfiles and replace with systemd-sysuers usage has no opposition. 16:53:29 +1 from me too 16:53:57 * dustymabe checks tickets with meeting label one more time 16:54:06 nothing else for now 16:54:09 #topic open floor 16:54:17 woah, really? 16:54:43 #info we had a great test week! thanks ravanelli for running the test week! 16:54:46 #link https://github.com/coreos/fedora-coreos-tracker/issues/1565#issuecomment-1743269024 16:54:53 ravanelli++ 16:54:53 mnguyen: Karma for ravanelli changed to 1 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 16:54:54 jlebon: yeah the other two were stale 16:54:55 =) 16:55:09 apologies for not completing the test case i said i would 16:55:22 fifofonix: please do anyway :) 16:55:25 ravanelli++ 16:55:25 travier: Karma for ravanelli changed to 2 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 16:55:30 it's never too late :) 16:55:30 i think you can still fill out the form 16:55:35 ravanelli++ 16:55:38 lorbus: Karma for ravanelli changed to 3 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 16:55:49 will do 16:55:56 so we do have releases going out later today (sorry we're a bit behind this week) 16:56:14 dustymabe: did you want to talk about that glibc CVE? 16:56:31 but my attention got drawn earlier to https://bodhi.fedoraproject.org/updates/FEDORA-2023-2b8c11ee75 which just went "stable" an hour ago 16:57:19 anybody want to weigh in on if we should take action there? 16:59:20 so, we're on 2.38-4 in next-devel and this is 2.38-6 17:00:08 there aren't a lot of changes apart from those CVE fixes 17:00:17 If we could get it in today's testing release that would be nice 17:00:19 for f38 the fix is in glibc-2.37-10.fc38 17:00:28 for f39 the fix is in glibc-2.38-6.fc39 17:01:01 let me check the diff on f38 17:01:05 yeah, just more #work 17:01:05 It's not critical for us normally as it's a local SUID privilege escalation and things should be running inside of containers so not capable of getting to that 17:01:46 If we don't get this in today's releases, then it doesn't land in stable until 4 weeks 17:01:50 which is not great 17:01:53 travier: correct 17:02:15 I expect exploits to appear really soon given the low complexity 17:02:22 we will be switching to weekly releases of `next` now that we are in freeze, but `testing` and `stable` are still at a two week cadence 17:02:36 a bit larger diff on testing (we're on -5.fc38), but still not much 17:03:36 marmijo: this means we'd need to do a new spin of `testing` and `next` 17:03:53 Okay, sounds good. I can get started on that 17:03:54 we probably wouldn't be able to start shipping the updates until tomorrow morning 17:04:07 i really wish our ppc64le builder wasn't being slow 17:04:49 I can monitor the builds throughout the rest of the day/night to ensure we get it out by today/tomorrow 17:04:55 so it's settled then? 17:05:06 yeah, looking at this, i think the probability of regression here is quite low 17:05:23 so if it's not too late to add it for this week's triple, i'd vote for adding it 17:05:45 "not too late" - we haven't run the release job(s) yet, but we were at that point 17:05:50 all tests had passed, etc.. 17:06:01 ahhh 17:06:27 should we go ahead and ship stable today? 17:06:41 since it's ready to go and our changes here wouldn't affect that? 17:07:36 while we are at it let's get the crun-wasm changes into `next` too 17:07:38 i think we need more info on that first CVE. hard to tell how easily exploitable that actually is 17:08:09 even so. would probably prefer some soak time in `testing` and then ship an ad-hoc if we did want to get it in stable 17:08:16 https://access.redhat.com/security/cve/cve-2023-4911 17:08:31 I'm suggesting only rebuilding testing & next with the fix, not stable 17:08:41 we already will be doing a `next` release next week (weekly next releases now) so we could just have the person do a stable one too 17:09:03 According to me this is OK if this waits a week or two before landing in stable 17:09:12 +1 17:09:19 Everyone that needs it right now can override replace 17:09:33 we should create a tracker issue (for paperwork purposes) 17:09:58 marmijo: grab me in matrix coreos channel and we can coordinate 17:10:39 any other topics for open floor? 17:10:56 dustymabe: SGTM 17:11:52 will close out the meeting soon 17:12:02 just a comment: f39 for me has been a lot smoother than f38 (so far). so i'm happy. 17:12:11 fifofonix: nice 17:12:21 https://blog.qualys.com/vulnerabilities-threat-research/2023/10/03/cve-2023-4911-looney-tunables-local-privilege-escalation-in-the-glibcs-ld-so has more useful info 17:12:47 > Our successful exploitation, leading to full root privileges on major distributions like Fedora, Ubuntu, and Debian, highlights this vulnerability’s severity and widespread nature. 17:13:31 i agree though we should let it bake in testing first, but should we consider an ad-hoc stable release ? 17:13:45 right. let's just plan to do it along with the `next` next week 17:14:18 yeah, let's do that +1 17:14:46 #endmeeting