Re: Removal of old projects from fedorahosted.

2008-09-10 Thread Jeremy Katz
On Tue, 2008-09-09 at 22:44 -0500, Mike McGrath wrote:
 So it seems I'm alone here, if we have to keep everything forever, thats
 what it'll be.  I'll just have to see to it we have the resources and
 backup materials in the future when that time comes.  I have a question
 and a suggestion for people.
 
 1) What do we do with projects to which no owner or responsible party can
 be found?  This caused major headaches during the elvis move...  headaches
 we still have today.  What would you have us do?

I think the idea of making them read-only/owned by an admin type group
seems reasonable at first blush.  It doesn't get rid of all of the
problems, but it does help with a number of them

 2) Right before we start removing projects is _not_ the time to discuss
 the policy.  When the policy is put in place... thats the time to discuss
 it.

I don't disagree at all.  I must have missed the initial discussion in
my sea of mail or I would have chimed in then :-/  

Jeremy

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Removal of old projects from fedorahosted.

2008-09-10 Thread Mike McGrath
On Wed, 10 Sep 2008, Jeremy Katz wrote:

 On Tue, 2008-09-09 at 22:44 -0500, Mike McGrath wrote:
  So it seems I'm alone here, if we have to keep everything forever, thats
  what it'll be.  I'll just have to see to it we have the resources and
  backup materials in the future when that time comes.  I have a question
  and a suggestion for people.
 
  1) What do we do with projects to which no owner or responsible party can
  be found?  This caused major headaches during the elvis move...  headaches
  we still have today.  What would you have us do?

 I think the idea of making them read-only/owned by an admin type group
 seems reasonable at first blush.  It doesn't get rid of all of the
 problems, but it does help with a number of them

  2) Right before we start removing projects is _not_ the time to discuss
  the policy.  When the policy is put in place... thats the time to discuss
  it.

 I don't disagree at all.  I must have missed the initial discussion in
 my sea of mail or I would have chimed in then :-/


no worries, I can admit to blowing my top last night, long day.  We'll
figure something out.  Taking a step back my core concerns are code to
which no one is responsible and what to do about that code.  _especially_
if its still in use somewhere.  It actually complicated the move away from
elvis quite a bit and I want to make sure that doesn't happen again.

We can look at that philosophically and practically.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Removal of old projects from fedorahosted.

2008-09-10 Thread Paul W. Frields
On Wed, 2008-09-10 at 09:57 -0500, Mike McGrath wrote:
 On Wed, 10 Sep 2008, Jeremy Katz wrote:
 
  On Tue, 2008-09-09 at 22:44 -0500, Mike McGrath wrote:
   So it seems I'm alone here, if we have to keep everything forever, thats
   what it'll be.  I'll just have to see to it we have the resources and
   backup materials in the future when that time comes.  I have a question
   and a suggestion for people.
  
   1) What do we do with projects to which no owner or responsible party can
   be found?  This caused major headaches during the elvis move...  headaches
   we still have today.  What would you have us do?
 
  I think the idea of making them read-only/owned by an admin type group
  seems reasonable at first blush.  It doesn't get rid of all of the
  problems, but it does help with a number of them
 
   2) Right before we start removing projects is _not_ the time to discuss
   the policy.  When the policy is put in place... thats the time to discuss
   it.
 
  I don't disagree at all.  I must have missed the initial discussion in
  my sea of mail or I would have chimed in then :-/
 
 
 no worries, I can admit to blowing my top last night, long day.  We'll
 figure something out.  Taking a step back my core concerns are code to
 which no one is responsible and what to do about that code.  _especially_
 if its still in use somewhere.  It actually complicated the move away from
 elvis quite a bit and I want to make sure that doesn't happen again.
 
 We can look at that philosophically and practically.

I think your concerns are really rational and well-placed.  Hope we
didn't get too irksome, and thanks for deconfusifying (a favorite
made-up word) the scenarios about how FI would approach de-listing.

-- 
Paul W. Frields
  gpg fingerprint: 3DA6 A0AC 6D58 FEC4 0233  5906 ACDB C937 BD11 3717
  http://paul.frields.org/   -  -   http://pfrields.fedorapeople.org/
  irc.freenode.net: stickster @ #fedora-docs, #fedora-devel, #fredlug


signature.asc
Description: This is a digitally signed message part
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Outage Notification - 2008-09-13 01:00 UTC

2008-09-10 Thread Dennis Gilmore
There will be an outage starting at Y2008-09-13 01:00 UTC, which will
last approximately 1 hour.

To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/Infrastructure/UTCHowto
or run:

date -d '2008-09-13 01:00 UTC'

Affected Services:
Buildsystem

Unaffected Services:
Websites
Database
CVS / Source Control
DNS
Mail
Torrent


Ticket Link:
https://fedorahosted.org/fedora-infrastructure/ticket/830

Reason for Outage:
update koji to 1.2.6.  it will enable us to turn garbage collection back on.

Contact Information:

Please join #fedora-admin in irc.freenode.net or respond to this email
to track
the status of this outage.



signature.asc
Description: This is a digitally signed message part.
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Orientation page

2008-09-10 Thread Mike McGrath
Hey guys I threw together a standard orientation page for new members.
Take a look and let me know what pieces you think are missing and fix
whatever problems you find.

http://fedoraproject.org/wiki/Infrastructure/SOP/Orientation

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Orientation page

2008-09-10 Thread susmit shannigrahi
 Take a look and let me know what pieces you think are missing and fix
 whatever problems you find.

mailing list address is not mentioned :)


-- 
Regards,
Susmit.

=
ssh
0x86DD170A
http://www.fedoraproject.org/wiki/user:susmit
=

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Orientation page

2008-09-10 Thread TJ Davis
Perhaps the standard meeting day/time could be included?

Tj

On Wed, Sep 10, 2008 at 12:37 PM, Mike McGrath [EMAIL PROTECTED] wrote:
 Hey guys I threw together a standard orientation page for new members.
 Take a look and let me know what pieces you think are missing and fix
 whatever problems you find.

 http://fedoraproject.org/wiki/Infrastructure/SOP/Orientation

-Mike

 ___
 Fedora-infrastructure-list mailing list
 Fedora-infrastructure-list@redhat.com
 https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


SELinux status update

2008-09-10 Thread Luke Macken
Over the past few months, I've been working closley with Dan Walsh and
Mike McGrath to solidify our SELinux deployment.  We're not yet to the
point where we can flip every system into enforcing mode, but we're
getting close.

We're at the point now where we can pretty much do everything we need to
do via our puppet configuration, and we've created a handful of
constructs that can be used to configure various aspects of SELinux, for
example:

== Setting custom context

semanage_fcontext { '/var/tmp/l10n-data(/.*)?':
type = 'httpd_sys_content_t'
}

== Toggling booleans

selinux_bool { 'httpd_can_network_connect_db': bool = 'on' }

== Allowing ports

semanage_port { '8081-8089': type = 'http_port_t', proto = 'tcp' }

== Deploying custom policy

semodule { 'fedora': }

I created a custom 'fedora' selinux module that is loaded on all systems
(that are configured with 'include selinux').  This module exists to fix
various issues custom to our environment, and to cover up minor
annoyances such as leaky file descriptors.

So, now it's just a matter of hunting down the existing issues, and
fixing them in puppet or in the SELinux policy.  I've been keeping our
infrastructure ahead of the RHEL5 selinux-policy, as Dan has fixed a lot
of our issues in his rpms.

I threw together a basic SOP for our SELinux configuration here:

https://fedoraproject.org/wiki/Infrastructure/SOP/SELinux

You can keep up to date on our SELinux deployment status here:

https://fedorahosted.org/fedora-infrastructure/ticket/230

Cheers,

luke


pgp0ocs37c3m2.pgp
Description: PGP signature
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Intrusion Detection System

2008-09-10 Thread Luke Macken
Hey all,

A couple of weeks ago I did an initial deployment of an Intrusion
Detection System in our infrastructure.  It utilizes the prelude stack,
and is currently powered by auditd and prelude-lml events.  Audit gives
us a ridiculous amount of power with regarding to monitoring
everything that happens on a system.  Prelude-lml, out of the box
using it's pcre plugin, is able to watch a large variety of service
logs, including many things we are running (asterisk, mod_security,
nagios, cacti, PAM, postfix, sendmail, selinux, shadowutils, sshd,
sudo).  Prewikka is the web-based frontend
(https://admin.fedoraproject.org/prewikka).

I created a new 'prelude' puppet module that contains the
configuration for audit, auditsp-plugins, libprelude,
prelude-manager, prewikka, prelude-correlator, and prelude-lml.
Turning a node/servergroup into a sensor entails adding the
following to your class definition: 'include prelude::sensor::audisp'
My initial deployment entailed setting up the prelude-manager
and correlator on a single box, and hooking up a single sensor
(bastion).

So, we're now at the point where we can fine tune our audit rules
before we further deploy this infrastructure.

Some things we want to consider:
- Creating specific security policies for each servergroup
- Define what files/directories/activities we want to monitor on
  which machines.
- What events to we want to escalate ?

I opened an infrastructure ticket to track this deployment here:

 https://fedorahosted.org/fedora-infrastructure/ticket/833

Suggestions, comments, and ideas are welcome.

Cheers,

luke


pgpvvOxYzWF8G.pgp
Description: PGP signature
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: SELinux status update

2008-09-10 Thread Stephen John Smoogen
2008/9/10 Luke Macken [EMAIL PROTECTED]:
 Over the past few months, I've been working closley with Dan Walsh and
 Mike McGrath to solidify our SELinux deployment.  We're not yet to the
 point where we can flip every system into enforcing mode, but we're
 getting close.


Very very very cool. I look forward to reading through all the puppet
side of things.





-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. The Merchant of Venice

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Detection System

2008-09-10 Thread Stephen John Smoogen
2008/9/10 Luke Macken [EMAIL PROTECTED]:
 Hey all,

 A couple of weeks ago I did an initial deployment of an Intrusion
 Detection System in our infrastructure.  It utilizes the prelude stack,
 and is currently powered by auditd and prelude-lml events.  Audit gives
 us a ridiculous amount of power with regarding to monitoring
 everything that happens on a system.  Prelude-lml, out of the box
 using it's pcre plugin, is able to watch a large variety of service
 logs, including many things we are running (asterisk, mod_security,
 nagios, cacti, PAM, postfix, sendmail, selinux, shadowutils, sshd,
 sudo).  Prewikka is the web-based frontend
 (https://admin.fedoraproject.org/prewikka).


for the EL-5 systems.. did you need to update audit from what is
provided by RHEL-5.2? It looked like it would be needed when I talked
with Steve Grubb because it required stuff that had not been ported to
EL-5. I would be interested in helping you test/document this? Where
can I start?


-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. The Merchant of Venice

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Detection System

2008-09-10 Thread Stephen John Smoogen
2008/9/10 Luke Macken [EMAIL PROTECTED]:
 Hey all,

 A couple of weeks ago I did an initial deployment of an Intrusion
 Detection System in our infrastructure.  It utilizes the prelude stack,
 and is currently powered by auditd and prelude-lml events.  Audit gives
 us a ridiculous amount of power with regarding to monitoring
 everything that happens on a system.  Prelude-lml, out of the box
 using it's pcre plugin, is able to watch a large variety of service
 logs, including many things we are running (asterisk, mod_security,
 nagios, cacti, PAM, postfix, sendmail, selinux, shadowutils, sshd,
 sudo).  Prewikka is the web-based frontend
 (https://admin.fedoraproject.org/prewikka).


for the EL-5 systems.. did you need to update audit from what is
provided by RHEL-5.2? It looked like it would be needed when I talked
with Steve Grubb because it required stuff that had not been ported to
EL-5. I would be interested in helping you test/document this? Where
can I start?


-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. The Merchant of Venice

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Detection System

2008-09-10 Thread Luke Macken
On Wed, Sep 10, 2008 at 06:29:38PM -0600, Stephen John Smoogen wrote:
 2008/9/10 Luke Macken [EMAIL PROTECTED]:
  Hey all,
 
  A couple of weeks ago I did an initial deployment of an Intrusion
  Detection System in our infrastructure.  It utilizes the prelude stack,
  and is currently powered by auditd and prelude-lml events.  Audit gives
  us a ridiculous amount of power with regarding to monitoring
  everything that happens on a system.  Prelude-lml, out of the box
  using it's pcre plugin, is able to watch a large variety of service
  logs, including many things we are running (asterisk, mod_security,
  nagios, cacti, PAM, postfix, sendmail, selinux, shadowutils, sshd,
  sudo).  Prewikka is the web-based frontend
  (https://admin.fedoraproject.org/prewikka).
 
 
 for the EL-5 systems.. did you need to update audit from what is
 provided by RHEL-5.2? It looked like it would be needed when I talked
 with Steve Grubb because it required stuff that had not been ported to
 EL-5. I would be interested in helping you test/document this? Where
 can I start?

Yep, RHEL's audit is not compiled with '--enable-prelude', so I respun
F-9's.  I also built rawhide's prelude stack.  All of these packages are
in the fedora-infrastructure repo.

As far as testing goes, I recommend setting up the stack on your home
network to get familar with it 
(http://people.redhat.com/sgrubb/audit/prelude.txt).

As for documentation, we definitely need to throw together a SOP, and
maybe some sort of audit policy for all of our various server groups.
Before we start tweaking out our audit rules, we should probably start
by defining security policies for our various systems so we can turn
them into audit rules and selinux policy.

luke

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list