Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

No.Project NameTSC Subgroup Release StatusIs this your first release Going for Maturity Review? 

CD Logs URL to be used for review

(Column filled in by PTLs)

Link to executive one pager

(editable doc format)

(Column filled in by PTLs)

API Info Reporting Review

(Column filled in by API Subcommittee)

(note for PTLs – go here for steps to fill in project API info form)

BluVal

Certification

Security

Certification

Provide link to Vuls, Lynis, and Kube-Hunter logs below.

Pass/Fail Criteria:  Steps To Implement Security Scan Requirements

Exception requests should be filed at:

https://wiki.akraino.org/display/AK/Akraino+CVE+Vulnerability+Exception+Request

Upstream Review (Column filled by Upstream Subcommittee and PTLs)


(note PTL can go to Release Upstream Compliance to find details)

Date ready for TSC review

(Column filled in by PTLs)

 TSC Review Date

(Column filled in by TSC)

1scheduled at 

TSC 2020-12-01 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/cvb/

Form uploaded

Scheduled for API subcommittee review

Waiting for re-uploaded API info form with PaaS API info

Reviewed by API subcommittee, PaaS APIs are subset of TARS APIs

Accepted

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/cvb/

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis: 

  1. Performing test ID AUTH-9229 (Check password hashing methods)

You are using SHA512 hashing which is good, however, it appears the number of rounds for password hashing is still set to default at 5000.  This value must be set higher, 65536.  Below is additional information on this topic:

The rounds=N option helps to improve key strengthening. The number of rounds has a larger impact on security than the selection of a hash function. For example, rounds=65536 means that an attacker has to compute 65536 hashes for each password he tests against the hash in your /etc/shadow. Therefore the attacker will be delayed by a factor of 65536. This also means that your computer must compute 65536 hashes every time you log in, but even on slow computers that takes less than 1 second. If you do not use the rounds option, then glibc will default to 5000 rounds for SHA-512. Additionally, the default value for the rounds option can be found in sha512-crypt.c.

Open /etc/pam.d/passwd with a text editor and add the rounds option at the end of of the uncommented line. After applying this change the line should look like this:

password       required       pam_unix.so sha512 shadow nullok rounds=65536

 After you change the number of rounds you will need to expire the existing passwords to encrypt using the new values.

  2.  Test: Check if one or more compilers can be found on the system

Reason: Our core components of BP are needing more than one compiler and fixing them can break our dependencies.

Since this BP is requesting a maturity review all compilers must be removed prior to using the system in production.  Are there components that require compilers in the completed production release code?

Exceptions approved shown at:

Release 4 Vuls Exception

Kube-Hunter:  Exception granted:  K8s not used by this BP.

Yes12/01
2scheduled at 

TSC 2020-12-01 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/iec-type4/

Form uploaded

Scheduled for API subcommittee review

Waiting for re-uploaded API info form with PaaS API info 

Reviewed by API subcommittee, PaaS APIs are subset of TARS APIs

Accepted

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/iec-type4/

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis: 

  1.  Performing test ID AUTH-9229 (Check password hashing methods)

You are using SHA512 hashing which is good, however, it appears the number of rounds for password hashing is still set to default at 5000.  This value must be set higher, 65536.  Below is additional information on this topic:

The rounds=N option helps to improve key strengthening. The number of rounds has a larger impact on security than the selection of a hash function. For example, rounds=65536 means that an attacker has to compute 65536 hashes for each password he tests against the hash in your /etc/shadow. Therefore the attacker will be delayed by a factor of 65536. This also means that your computer must compute 65536 hashes every time you log in, but even on slow computers that takes less than 1 second. If you do not use the rounds option, then glibc will default to 5000 rounds for SHA-512. Additionally, the default value for the rounds option can be found in sha512-crypt.c.

Open /etc/pam.d/passwd with a text editor and add the rounds option at the end of of the uncommented line. After applying this change the line should look like this:

password       required       pam_unix.so sha512 shadow nullok rounds=65536

 After you change the number of rounds you will need to expire the existing passwords to encrypt using the new values.

  2.  Test: Check if one or more compilers can be found on the system

Reason: Our core components of BP are needing more than one compiler and fixing them can break our dependencies.

Since this BP is requesting a maturity review all compilers must be removed prior to using the system in production.  Are there components that require compilers in the completed production release code?

Exceptions approved shown at:

Release 4 Vuls Exception

Kube-Hunter:  Exception granted:  K8s not used by this BP.

Yes12/01
3Scheduled at Release 4 Review 2020-12-01 (Tues) 7 am PacificNMature

https://nexus.akraino.org/content/sites/logs/att/job/Install_REC_on_OpenEdge1/

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/rec-aarch64_baremetal-install-rec-weekly-master/

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/att/job/Bluval_Logs/results-11-27-2020.tar

https://nexus.akraino.org/content/sites/logs/att/job/Bluval_Logs/results-11-27-2020.tar

 

VulsAccepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis:   -ISSUES that MUST be fixed for Maturity or a more specific exception reason needs to be provided:

  1. Performing test ID AUTH-9229 (Check password hashing methods)
  2. Test: Checking SHA_CRYPT_MIN_ROUNDS option in /etc/login.defs
  3. Performing test ID USB-2000 (Check USB authorizations)
  4. Performing test ID USB-3000 (Check for presence of USBGuard)
  5. Test: Checking ClientAliveInterval in /tmp/lynis.ZotHQ7RQAj
  6. Test: Checking MaxAuthTries in /tmp/lynis.ZotHQ7RQAj
  7. Test: Checking MaxSessions in /tmp/lynis.ZotHQ7RQAj
  8. Test: Checking Port in /tmp/lynis.ZotHQ7RQAj
  9. Test: Checking TCPKeepAlive in /tmp/lynis.ZotHQ7RQAj
  10. Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
  11. sysctl key kernel.kptr_restrict has a different value than expected in scan profile. Expected=2, Real=0
  12. sysctl key kernel.sysrq has a different value than expected in scan profile. Expected=0, Real=16
  13. sysctl key kernel.yama.ptrace_scope has a different value than expected in scan profile. Expected=1 2 3, Real=0
  14. sysctl key net.ipv4.conf.all.forwarding has a different value than expected in scan profile. Expected=0, Real=1
  15. sysctl key net.ipv6.conf.all.accept_redirects has a different value than expected in scan profile. Expected=0, Real=1
  16. sysctl key net.ipv6.conf.default.accept_redirects has a different value than expected in scan profile. Expected=0, Real=1
  17. Performing test ID HRDN-7220 (Check if one or more compilers are installed)

Kube-Hunter: Does not appear to have run correctly - question sent to BP owner

Yes12/01
4Scheduled at 

Release 4 Review 2020-12-16 (Wed) 7 am Pacific

NN

ICN Master Baremetal Deployment Verifier

ICN Master Virtual Deployment Verifier

ICN SDEWAN Master End2End Testing

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/intel/bluval_results/icn/master/20201210-010310/.

https://nexus.akraino.org/content/sites/logs/intel/bluval_results/icn/master/20201210-010310/

ICN R4 Test Document#BluValTesting

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception


Lynis:  Accepted with exceptions shown at:

Release 4 Lynis Exceptions


k8s/conformance:

Kube-Hunter:  Accepted

  • The logs show the run with the aquasec/kube-hunter:edge image to fix the CAP_NET_RAW inside a pod issue


Yes12/1012/16
5scheduled at 

TSC 2020-12-16 (Tues) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/iotgateway/job/eliot-iotgateway-deploy-k8s-virtual-daily-master/684/

ELIOT R4 IOT-Gateway Datasheet

Form uploaded

Reviewed by API subcommittee  

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/iotgateway/job/eliot-iotgateway-bluval-virtual-daily-master/37/results/os/lynis/lynis.log

vuls exceptions Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:  Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/08
6scheduled at 

TSC 2020-12-16 (Tues) 7 am Pacific

NNhttps://nexus.akraino.org/content/sites/logs/huawei/blueprints/uCPE/job/eliot-uCPE-deploy-k8s-centos-virtual-daily-master/545/ELIOT R4 - SD-WAN / WAN Edge / uCPE Data Sheet

Form uploaded

Reviewed by API subcommittee  

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/uCPE/job/eliot-uCPE-deploy-k8s-centos-virtual-daily-master/549/results/os/lynis/lynis.log

vuls exceptions Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:  Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/08
7

Scheduled at

Release 4 Review 2020-12-09 (Wed) 7:30am


NNot Applicable

https://nexus.akraino.org/content/sites/logs/juniper/job/NC-Tungsten_Fabric/40/

https://nexus.akraino.org/content/sites/logs/juniper/validation-results/



NetworkCloud-TF blueprint Datasheet.docx

Form uploaded

Scheduled for API subcommittee review  

Accepted

Y

 

Vuls: Accepted with exceptions shown at:

Release 4 Vuls Exception


 

Lynis:  ISSUES that MUST be fixed or a more specific exception reason needs to be provided:

  1. Performing test ID AUTH-9328 (Default umask values)
  2. Test: Check if one or more compilers can be found on the system

Following compilers found:

  • Found known binary: as (compiler) - /usr/bin/as
  • Found known binary: cc (compiler) - /usr/bin/cc
  • Found known binary: gcc (compiler) - /usr/bin/gcc

 

Kube-Hunter:  In review

Sukhdev Kapur has requested that the Release 3 exceptions be provided for Release 4

Yes12/0912/09
8Scheduled at 

TSC 2020-12-17 (Thurs) 7 am Pacific

NN

AWS footprint:
https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-pae-verify-deploy-aws/81/

GCP footprint:

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-pae-verify-deploy-gcp/51/


Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/

 

Vuls:  Accepted with exception.  The KNI Provider Access Edge blueprint uses OpenShift as its k8s distribution, which is deployed on Red Hat CoreOS, an immutable OS that is not supported by Vuls.

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/os/vuls/log.html.gz


Lynis:

 

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/os/lynis/

Accepted with exceptions shown at:

Release 4 Lynis Exceptions


Kube-Hunter: 

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/k8s/kube-hunter/Kube-Hunter.Kube-Hunter/

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/0912/09
9


Slides for KNI blueprints review:

Akraino_KNI_Release4_Review.pdf

Scheduled at 

TSC 2020-12-17 (Thurs) 7 am Pacific

YN

Mgmt Hub logs:

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-management-hub-verify-deploy-gcp/9/

IE logs:

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-ie-verify-deploy-gcp/2/


Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/

 

Vuls:  Accepted with exception.  The KNI Industrial Edge blueprint uses OpenShift as its k8s distribution, which is deployed on Red Hat CoreOS, an immutable OS that is not supported by Vuls.

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/os/vuls/log.html.gz


Lynis:

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/os/lynis/

Accepted with exceptions shown at:

Release 4 Lynis Exceptions



Kube-Hunter: 

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/k8s/kube-hunter/Kube-Hunter.Kube-Hunter/

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes

10

Micro-MEC


YNhttps://nexus.akraino.org/content/sites/logs/micromecAkraino R3 MicroMEC blueprint datasheet.docx

Form uploaded

API committee review scheduled for

N/A





11

Scheduled at TSC 2020-11-24 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/baidu/job/aiedge-otestack-master-deploy/

https://nexus.akraino.org/content/sites/logs/baidu/job/aiedge-otestack-master-validation/

Hechun replied by e-mail 12Jan, API info form is in progress

API committee review tentatively scheduled for

N/A


Yes (Please also update the upstream version besides the repo name)06/02
12
YN




Yes (Please update the upstream versions besides the repo name)

13

5G MEC/Slice System to Support Cloud Gaming, HD Video and Live Broadcasting Blueprint

Feng Yang


YN

https://nexus.akraino.org/content/sites/logs/tencent/job/5g-mec-cloud-gaming-CD/15/

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/5g-mec-cloud-gaming-master-verify/

5G MEC Rel 3 Datasheet

Form uploaded  

Accepted

N/A

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions


Kube-Hunter: 

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Please update the release note with upstream information (R4 - Release Notes)06/03
14

Scheduled at

TSC 2021-1-28 (Thurs) 7 am Pacific

NNhttps://nexus.akraino.org/content/sites/logs/ampere/job/akraino_arm_anbox_test/6/

PTL replied by e-mail  that they have no APIs offered or consumed, but . API subcommittee replied they still need to fill out and upload the API info reporting form with BP name and comments explaining current and future API status, and upload the form



Yes01/28
15Scheduled at 

TSC 2020-12-10 (Thurs) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/bytedance/job/run-install-bluefield-fs/

https://nexus.akraino.org/content/sites/logs/bytedance/job/run-install-ovs-dpdk/

Form uploaded

Scheduled for API subcommittee review

Accepted



Yes06/04
16scheduled at 

TSC 2020-12-10(Thurs) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/ealt-edge/job/ealt-edge-deploy-virtual-daily-master/397

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/ealt-edge/job/ealt-edge-bluval-daily-master/251/results/

Vuls Exception Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

updated results link - 09-dec

Yes12/10
17

Scheduled at TSC 2021-1-14 (Thurs) 7 am Pacific

PCEI Time Slot 7:30-8:00 am Pacific

Y
https://nexus.akraino.org/content/sites/logs/cmti/job/pcei-daily/PCEI R4 Datasheet

Form uploaded 4Jan

Scheduled for API subcommittee review  

For R4, third-party location API provided as an example in PCEI architecture diagrams. For R5 they expect PCEI APIs to be exported

Accepted

https://nexus.akraino.org/content/sites/logs/pcei/job/v1/

New BluVal logs 2021-01-08:

https://nexus.akraino.org/content/sites/logs/pcei/job/v2/results/

 

Updated BluVal logs with fixed sysctl key net.ipv4.conf.default.accept_source_route

https://nexus.akraino.org/content/sites/logs/pcei/job/v3/

 

Updated BluVal logs with fixed Kube-Hunter Vulnerability KHV050, KHV002, KHV005

https://nexus.akraino.org/content/sites/logs/pcei/job/v4/


 

Vuls:

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

vuls.log included in the new logs (V2)

Lynis:  Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions


Yes01/14/21
18Scheduled at 

TSC 2020-12-08 (Tues) 7 am Pacific

YNhttps://nexus.akraino.org/content/sites/logs/webank/job/Federated ML application at edge R4 Datasheet

Form uploaded

Reviewed by API subcommittee

Accepted

N/AYes12/08
19Scheduled at Release 4 Review 2020-11-17 (Tue) 7 am PacificYNhttps://nexus.akraino.org/content/sites/logs/futurewei/kubeedgees/

Form uploaded

Reviewed by API subcommittee

Accepted

Yes

https://nexus.akraino.org/content/sites/logs/futurewei/kubeedgees/58/results/

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis:  Accepted

Kube-Hunter: Exception granted:  KubeEdge node is not on same subnet as the cloud node.  Communication occurs through the websocket endpoint, so kube-hunter can't be used.

Yes11/17
20
Y


Prem replied by e-mail 17Jan, API info form is in progress

API committee review tentatively scheduled for






21Scheduled at Release 4 Review 2020-12-09 YNhttps://nexus.akraino.org/content/sites/logs/ai_solutions/job/Eden-flir/

Form uploaded

Reviewed by API subcommittee  , waiting for revised API info form to be uploaded

2nd revision of form uploaded   by V S

Final review by API subcommittee set for

Accepted



Yes12/09


...