Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

No.Project NameTSC Subgroup Release StatusIs this your first release Going for Maturity Review? 

CD Logs URL to be used for review

(Column filled in by PTLs)

Link to executive one pager

(editable doc format)

(Column filled in by PTLs)

API Info Reporting Review

(Column filled in by API Subcommittee)

(note for PTLs – go here for steps to fill in project API info form)

BluVal

Certification

Security

Certification

Provide link to Vuls, Lynis, and Kube-Hunter logs below.

Pass/Fail Criteria:  Steps To Implement Security Scan Requirements

Exception requests should be filed at:

https://wiki.akraino.org/display/AK/Akraino+CVE+Vulnerability+Exception+Request

Upstream Review (Column filled by Upstream Subcommittee and PTLs)


(note PTL can go to Release Upstream Compliance to find details)

Date ready for TSC review

(Column filled in by PTLs)

 TSC Review Date

(Column filled in by TSC)

1scheduled at 

TSC 2020-12-01 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/cvb/

Form uploaded

Scheduled for API subcommittee review

Waiting for re-uploaded API info form with PaaS API info

Reviewed by API subcommittee, PaaS APIs are subset of TARS APIs

Accepted

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/cvb/

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis: 

  1. Performing test ID AUTH-9229 (Check password hashing methods)

You are using SHA512 hashing which is good, however, it appears the number of rounds for password hashing is still set to default at 5000.  This value must be set higher, 65536.  Below is additional information on this topic:

The rounds=N option helps to improve key strengthening. The number of rounds has a larger impact on security than the selection of a hash function. For example, rounds=65536 means that an attacker has to compute 65536 hashes for each password he tests against the hash in your /etc/shadow. Therefore the attacker will be delayed by a factor of 65536. This also means that your computer must compute 65536 hashes every time you log in, but even on slow computers that takes less than 1 second. If you do not use the rounds option, then glibc will default to 5000 rounds for SHA-512. Additionally, the default value for the rounds option can be found in sha512-crypt.c.

Open /etc/pam.d/passwd with a text editor and add the rounds option at the end of of the uncommented line. After applying this change the line should look like this:

password       required       pam_unix.so sha512 shadow nullok rounds=65536

 After you change the number of rounds you will need to expire the existing passwords to encrypt using the new values.

  2.  Test: Check if one or more compilers can be found on the system

Reason: Our core components of BP are needing more than one compiler and fixing them can break our dependencies.

Since this BP is requesting a maturity review all compilers must be removed prior to using the system in production.  Are there components that require compilers in the completed production release code?

Exceptions approved shown at:

Release 4 Vuls Exception

Kube-Hunter:  Exception granted:  K8s not used by this BP.

Yes12/01
2scheduled at 

TSC 2020-12-01 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/iec-type4/

Form uploaded

Scheduled for API subcommittee review

Waiting for re-uploaded API info form with PaaS API info 

Reviewed by API subcommittee, PaaS APIs are subset of TARS APIs

Accepted

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/iec-type4/

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis: 

  1.  Performing test ID AUTH-9229 (Check password hashing methods)

You are using SHA512 hashing which is good, however, it appears the number of rounds for password hashing is still set to default at 5000.  This value must be set higher, 65536.  Below is additional information on this topic:

The rounds=N option helps to improve key strengthening. The number of rounds has a larger impact on security than the selection of a hash function. For example, rounds=65536 means that an attacker has to compute 65536 hashes for each password he tests against the hash in your /etc/shadow. Therefore the attacker will be delayed by a factor of 65536. This also means that your computer must compute 65536 hashes every time you log in, but even on slow computers that takes less than 1 second. If you do not use the rounds option, then glibc will default to 5000 rounds for SHA-512. Additionally, the default value for the rounds option can be found in sha512-crypt.c.

Open /etc/pam.d/passwd with a text editor and add the rounds option at the end of of the uncommented line. After applying this change the line should look like this:

password       required       pam_unix.so sha512 shadow nullok rounds=65536

 After you change the number of rounds you will need to expire the existing passwords to encrypt using the new values.

  2.  Test: Check if one or more compilers can be found on the system

Reason: Our core components of BP are needing more than one compiler and fixing them can break our dependencies.

Since this BP is requesting a maturity review all compilers must be removed prior to using the system in production.  Are there components that require compilers in the completed production release code?

Exceptions approved shown at:

Release 4 Vuls Exception

Kube-Hunter:  Exception granted:  K8s not used by this BP.

Yes12/01
3Scheduled at Release 4 Review 2020-12-01 (Tues) 7 am PacificNMature

https://nexus.akraino.org/content/sites/logs/att/job/Install_REC_on_OpenEdge1/

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/rec-aarch64_baremetal-install-rec-weekly-master/

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/att/job/Bluval_Logs/results-11-27-2020.tar

https://nexus.akraino.org/content/sites/logs/att/job/Bluval_Logs/results-11-27-2020.tar

 

VulsAccepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis:   -ISSUES that MUST be fixed for Maturity or a more specific exception reason needs to be provided:

  1. Performing test ID AUTH-9229 (Check password hashing methods)
  2. Test: Checking SHA_CRYPT_MIN_ROUNDS option in /etc/login.defs
  3. Performing test ID USB-2000 (Check USB authorizations)
  4. Performing test ID USB-3000 (Check for presence of USBGuard)
  5. Test: Checking ClientAliveInterval in /tmp/lynis.ZotHQ7RQAj
  6. Test: Checking MaxAuthTries in /tmp/lynis.ZotHQ7RQAj
  7. Test: Checking MaxSessions in /tmp/lynis.ZotHQ7RQAj
  8. Test: Checking Port in /tmp/lynis.ZotHQ7RQAj
  9. Test: Checking TCPKeepAlive in /tmp/lynis.ZotHQ7RQAj
  10. Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
  11. sysctl key kernel.kptr_restrict has a different value than expected in scan profile. Expected=2, Real=0
  12. sysctl key kernel.sysrq has a different value than expected in scan profile. Expected=0, Real=16
  13. sysctl key kernel.yama.ptrace_scope has a different value than expected in scan profile. Expected=1 2 3, Real=0
  14. sysctl key net.ipv4.conf.all.forwarding has a different value than expected in scan profile. Expected=0, Real=1
  15. sysctl key net.ipv6.conf.all.accept_redirects has a different value than expected in scan profile. Expected=0, Real=1
  16. sysctl key net.ipv6.conf.default.accept_redirects has a different value than expected in scan profile. Expected=0, Real=1
  17. Performing test ID HRDN-7220 (Check if one or more compilers are installed)

Kube-Hunter: Does not appear to have run correctly - question sent to BP owner

Yes12/01
4Scheduled at 

Release 4 Review 2020-12-16 (Wed) 7 am Pacific

NN

ICN Master Baremetal Deployment Verifier

ICN Master Virtual Deployment Verifier

ICN SDEWAN Master End2End Testing

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/intel/bluval_results/icn/master/20201210-010310/.

https://nexus.akraino.org/content/sites/logs/intel/bluval_results/icn/master/20201210-010310/

ICN R4 Test Document#BluValTesting

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception


Lynis:  Accepted with exceptions shown at:

Release 4 Lynis Exceptions


k8s/conformance:

Kube-Hunter:  Accepted

  • The logs show the run with the aquasec/kube-hunter:edge image to fix the CAP_NET_RAW inside a pod issue


Yes12/1012/16
5scheduled at 

TSC 2020-12-16 (Tues) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/iotgateway/job/eliot-iotgateway-deploy-k8s-virtual-daily-master/684/

ELIOT R4 IOT-Gateway Datasheet

Form uploaded

Reviewed by API subcommittee  

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/iotgateway/job/eliot-iotgateway-bluval-virtual-daily-master/37/results/os/lynis/lynis.log

vuls exceptions Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:  Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/08
6scheduled at 

TSC 2020-12-16 (Tues) 7 am Pacific

NNhttps://nexus.akraino.org/content/sites/logs/huawei/blueprints/uCPE/job/eliot-uCPE-deploy-k8s-centos-virtual-daily-master/545/ELIOT R4 - SD-WAN / WAN Edge / uCPE Data Sheet

Form uploaded

Reviewed by API subcommittee  

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/uCPE/job/eliot-uCPE-deploy-k8s-centos-virtual-daily-master/549/results/os/lynis/lynis.log

vuls exceptions Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:  Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/08
7

Scheduled at

Release 4 Review 2020-12-09 (Wed) 7:30am


NNot Applicable

https://nexus.akraino.org/content/sites/logs/juniper/job/NC-Tungsten_Fabric/40/

https://nexus.akraino.org/content/sites/logs/juniper/validation-results/



NetworkCloud-TF blueprint Datasheet.docx

Form uploaded

Scheduled for API subcommittee review  

Accepted

Y

 

Vuls: Accepted with exceptions shown at:

Release 4 Vuls Exception


 

Lynis:  ISSUES that MUST be fixed or a more specific exception reason needs to be provided:

  • Performing test ID BOOT-5122 (Check for GRUB boot password)
  • Test

    :

    Checking PASS_MAX_DAYS option in /etc/login.defs

    1. Performing test ID AUTH-9328 (Default umask values)
    2. Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
    3. sysctl key fs.suid_dumpable contains equal expected and current value (0)
    4. sysctl key kernel.dmesg_restrict contains equal expected and current value (1)
    5. Test: Check if one or more compilers can be found on the system

    Following compilers found:

    • Found known binary: as (compiler) - /usr/bin/as
    • Found known binary: cc (compiler) - /usr/bin/cc
    • Found known binary: gcc (compiler) - /usr/bin/gcc

     

    Kube-Hunter:  In review

    Sukhdev Kapur has requested that the Release 3 exceptions be provided for Release 4

    Yes12/0912/09
    8Scheduled at 

    TSC 2020-12-17 (Thurs) 7 am Pacific

    NN

    AWS footprint:
    https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-pae-verify-deploy-aws/81/

    GCP footprint:

    https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-pae-verify-deploy-gcp/51/


    Form uploaded

    Reviewed by API subcommittee

    Accepted

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/

     

    Vuls:  Accepted with exception.  The KNI Provider Access Edge blueprint uses OpenShift as its k8s distribution, which is deployed on Red Hat CoreOS, an immutable OS that is not supported by Vuls.

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/os/vuls/log.html.gz

    Lynis:

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/os/lynis/log.html.gz

    ISSUES that MUST be fixed or a more specific exception reason needs to be provided:

    1.  Test: Checking PASS_MAX_DAYS option in /etc/login.defs
    2. Performing test ID AUTH-9328 (Default umask values)
    3. Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
    4. sysctl key kernel.dmesg_restrict contains equal expected and current value (1)
    5. sysctl key net.ipv4.conf.default.accept_source_route contains equal expected and current value (0)

    Exceptions can be granted for the issues listed in the link below, but should also be corrected for this release if possible.  The issues listed in exceptions must be fixed prior to maturity.

    Release 4 Lynis Exceptions

    Kube-Hunter: 

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/k8s/kube-hunter/log.html.gz

    Failed:  The vulnerabilities listed in the kube-hunter cluster.log and pod.log files must be remediated or a reason for an exception for each vulnerability provided to the security team.

    Yes12/0912/09
    9


    Slides for KNI blueprints review:

    Akraino_KNI_Release4_Review.pdf

    Scheduled at 

    TSC 2020-12-17 (Thurs) 7 am Pacific

    YN

    Mgmt Hub logs:

    https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-management-hub-verify-deploy-gcp/9/

    IE logs:

    https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-ie-verify-deploy-gcp/2/


    Form uploaded

    Reviewed by API subcommittee

    Accepted

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/

     

    Vuls:  Accepted with exception.  The KNI Industrial Edge blueprint uses OpenShift as its k8s distribution, which is deployed on Red Hat CoreOS, an immutable OS that is not supported by Vuls.

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/os/vuls/log.html.gz

    Lynis:

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/os/lynis/log.html.gz

    ISSUES that MUST be fixed or a more specific exception reason needs to be provided:

    1.  Test: Checking PASS_MAX_DAYS option in /etc/login.defs
    2. Performing test ID AUTH-9328 (Default umask values)
    3. Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
    4. sysctl key kernel.dmesg_restrict contains equal expected and current value (1)
    5. sysctl key net.ipv4.conf.default.accept_source_route contains equal expected and current value (0)

    Exceptions can be granted for the issues listed in the link below, but should also be corrected for this release if possible.  The issues listed in exceptions must be fixed prior to maturity.

    Release 4 Lynis Exceptions

    Kube-Hunter: 

    https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/k8s/kube-hunter/log.html.gz

    Failed:  The vulnerabilities listed in the kube-hunter cluster.log and pod.log files must be remediated or a reason for an exception for each vulnerability provided to the security team.

    Yes

    10

    Micro-MEC


    YNhttps://nexus.akraino.org/content/sites/logs/micromecAkraino R3 MicroMEC blueprint datasheet.docxForm uploadedN/A





    11

    Scheduled at TSC 2020-11-24 (Tues) 7 am Pacific

    NY

    https://nexus.akraino.org/content/sites/logs/baidu/job/aiedge-otestack-master-deploy/

    https://nexus.akraino.org/content/sites/logs/baidu/job/aiedge-otestack-master-validation/


    N/A



    06/02
    12
    YN







    13

    5G MEC/Slice System to Support Cloud Gaming, HD Video and Live Broadcasting Blueprint

    Feng Yang


    YN

    https://nexus.akraino.org/content/sites/logs/tencent/job/5g-mec-cloud-gaming-CD/15/

    https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/5g-mec-cloud-gaming-master-verify/

    5G MEC Rel 3 DatasheetForm uploadedN/A



    06/03
    14

    Scheduled at

    TSC 2021-1-14 (Thurs) 7 am Pacific

    NNhttps://nexus.akraino.org/content/sites/logs/ampere/job/akraino_arm_anbox_test/6/




    01/15
    15Scheduled at 

    TSC 2020-12-10 (Thurs) 7 am Pacific

    NN

    https://nexus.akraino.org/content/sites/logs/bytedance/job/run-install-bluefield-fs/

    https://nexus.akraino.org/content/sites/logs/bytedance/job/run-install-ovs-dpdk/

    Form uploaded

    Scheduled for API subcommittee review

    Accepted



    Yes06/04
    16scheduled at 

    TSC 2020-12-10(Thurs) 7 am Pacific

    NN

    https://nexus.akraino.org/content/sites/logs/huawei/blueprints/ealt-edge/job/ealt-edge-deploy-virtual-daily-master/397

    Form uploaded

    Reviewed by API subcommittee

    Accepted

    https://nexus.akraino.org/content/sites/logs/huawei/blueprints/ealt-edge/job/ealt-edge-bluval-daily-master/251/results/

    Vuls Exception Akraino CVE Vulnerability Exception Request

    Akraino BluVal Exception Request

    updated results link - 09-dec

    Yes12/10
    17

    Scheduled at TSC 2021-1-14 (Thurs) 7 am Pacific

    PCEI Time Slot 7:30-8:00 am Pacific

    Y
    https://nexus.akraino.org/content/sites/logs/cmti/job/pcei-daily/PCEI R4 Datasheet

    Form uploaded 4Jan

    Scheduled for API subcommittee review  

    For R4, third-party location API provided as an example in PCEI architecture diagrams. For R5 they expect PCEI APIs to be exported

    Accepted

    https://nexus.akraino.org/content/sites/logs/pcei/job/v1/

    New BluVal logs 2021-01-08:

    https://nexus.akraino.org/content/sites/logs/pcei/job/v2/results/

     

    Vuls:

    Vuls:  Accepted with exceptions shown at:

    Release 4 Vuls Exception Request

    vuls.log included in the new logs (V2)

    Lynis:

    ISSUES that MUST be fixed or a more specific exception reason needs to be provided:

    1. Performing test ID AUTH-9328 (Default umask values)
    2. sysctl key net.ipv4.conf.default.accept_source_route contains equal expected and current value (0)

    Exceptions can be granted for the issues listed in the link below, but should also be corrected for this release if possible.  The issues listed in exceptions must be fixed prior to maturity.

    Release 4 Lynis Exceptions

    Kube-Hunter:

    Failed:  The vulnerabilities listed in the kube-hunter cluster.log and pod.log files must be remediated or a reason for an exception for each vulnerability provided to the security team.

    Yes01/14/21
    18Scheduled at 

    TSC 2020-12-08 (Tues) 7 am Pacific

    YNhttps://nexus.akraino.org/content/sites/logs/webank/job/Federated ML application at edge R4 Datasheet

    Form uploaded

    Reviewed by API subcommittee

    Accepted

    N/AYes12/08
    19Scheduled at Release 4 Review 2020-11-17 (Tue) 7 am PacificYNhttps://nexus.akraino.org/content/sites/logs/futurewei/kubeedgees/

    Form uploaded

    Reviewed by API subcommittee

    Accepted

    Yes

    https://nexus.akraino.org/content/sites/logs/futurewei/kubeedgees/58/results/

    Akraino BluVal Exception Request

     

    Vuls:  Accepted with exceptions shown at:

    Release 4 Vuls Exception Request

     

    Lynis:  Accepted

    Kube-Hunter: Exception granted:  KubeEdge node is not on same subnet as the cloud node.  Communication occurs through the websocket endpoint, so kube-hunter can't be used.

    Yes11/17
    20
    Y








    21Scheduled at Release 4 Review 2020-12-09 YNhttps://nexus.akraino.org/content/sites/logs/ai_solutions/job/Eden-flir/

    Form uploaded

    Reviewed by API subcommittee  , waiting for revised API info form to be uploaded

    2nd revision of form uploaded   by V S

    Final review by API subcommittee set for




    12/09


    ...