Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Please find below the Minutes of Meetings and recording for the  SECCOM meeting that was held on 31st of March 2020.

Jira No
SummaryDescriptionStatusSolution

Review of OJSIs with SO (Seshu)

SO made an effort to close several OJSIs and only one is remaining - for this specific one waiver for SO for OJSI with AAF interaction – approved by SECCOM.

Whitelisted projects - Krzysztof will submit a patch to Morgan.

REplacement of AAF by service mesh - we want to replace only part of AAF which is 


Recommen waiver for SO for OJSI with AAF interaction.

List of security items that must be addressed for Frankfurt release

TSC requested general report on ONAP security that should include list of items that must be completed by end of Frankfurt release and plan to move forward after Frankfurt.

For removing hardcoded passwords from HELM charts many challemges appeard so not finished as expected. - key takeaway is to do most of the work inside of the OOM repo. Solution was to create an init container and just replacing those passwords by putting it in momory volume which is as secure as the application taking it for environment variable. The difference with AAF solution is that it using persistent volume while Krzysztof used in memory volume.

Jonathan's AAF Video

Discussion on http ports open for test purpose (DCAE with VES collector use case). Nokia will fix PNF simulator.

Brief review of SECCOM requirements for FRankfurt release ranked by TSC with a priority1:  REQ-235 (Password removal from OOM HELM charts) and  REQ-231 (HTTPS communication vs. HTTP).

ONAP use cases shall be ran by user in default ONAP deployment which is secure.

Problem statement: ONAP simulators that are not compliant with https policy and support only http. Morgan and Marco are the right points ofcontact for this issue.

Discussion on ONAP code and ONAP testing difference - baseline security requirements should be exactly te same for both. VNF Requirement for https communication puts an obligation on ONAP simulators as well. Reference: VNF HTTPS requirement R-49109: The VNF or PNF MUST support HTTPS using TLS v1.2 or higher with strong cryptographic ciphers. 

This requirement was formalized when Frankfurt was already in progress?

In service mesh internal communication is done with mTLS. For an external communication it would be an ingress controller for example: SSO certificate at the entry and then from ingress controller to component using a separate certificate that comes from the mesh.

Regarding encoded passwords - for now we are doing only MariaDB-galera. Projects like DCAE and A&AI are authenticating to each other using user names and passwords - if we decide to go with service mesh, user names and passwords would be dropped in favour of mTLS and certificate based authentication. That way we would eliminate a lot of hardcoded passwords without using Kubernetes secrets, just by providing certificate and moving from basic auth to certificate based authentication. Every service has certificate that is binded for its identity (for identification) and private key for authorization.

For service mesh implemenattion - document framework for Guilin release and for the H release make application - really use it.


Security MVP proposal for a Frankfurt release and draft for Guilin release are available on the Wiki

Action Point - -email to be sent by Awel to TSC and ONAP community with link reference to Security requirements for a Frankfurt release. 








Action Point: to join OOM meeting on Wednesdays to address simulators compliance with https requirements.











The idea is to organize a security framework based on service mesh as a deliverable for Guilin release to avoid push-back from some PTLs .


Ongoing direct vulnerabilities analysis for components upgrades guidelines

Amy completed the work for non AT&T led projects. Pawel is progressing with most of AT&T ones.We focus on criticals and severes.

Amy created a table on a Wiki with reference for upgrade versions.

For ODL upgrade will have to be done with multi-jump fashion.

There was no time to present the results in the detail

Outputs to be presented at the next SECCOM. 


Docker image version to be added. - for the exact version Fabian will check with Sylvain.


Security guidelines for ONAP – meeting summary

Harald shared his positive feedback on last meeting. Amy is already working on an item. We will use Wiki as a collaboration space and then transfer it to readthedocs.
Link for the readthedocs scripts to be shared by Harald.

Service Mesh risk analysis – meeting summary available here

Service mesh requirements from security perspective followed by risk analysis.


Hackathon for httpsSelf-signed tls certificates to be used around begining of the release. Same methodology to be used by all projects. by M1 support for https, then Hackathon organized and by M2 everyone is integrated with AAF.


 OUR NEXT SECCOM MEETING CALL WILL BE HELD ON 7th OF APRIL'20







  • No labels