Loading…
DevConf.cz 2021 has ended
Security / IdM [clear filter]
Friday, February 19
 

9:45am CET

Container security automation with Ansible
Docker containers are the new way developers package applications. Due to the ease of use and deployment, more and more applications are getting deployed in containers for production use. With so many moving parts, it becomes imperative that we have the capability to continuously scan Docker containers for security issues. We will explore following points in our discussion:
- Understanding continuous security concepts
- Automating vulnerability assessments of Docker containers using Ansible
- Scheduled scans using Ansible Tower for Docker security
- Scheduled scans using Ansible Tower for operating systems and kernel security
- Scheduled scans for file integrity checks, host level monitoring using Ansible for various compliance initiatives

Speakers
SJ

Sumit Jaiswal

Principal Software Engineer, Red Hat


Friday February 19, 2021 9:45am - 10:25am CET
Session Room 2

12:30pm CET

What's new in USBGuard 1.0?
As technology advances, there are USB devices that may destroy your computer and even official enterprise USB devices infected with malware. With that in mind, have you ever felt uneasy about your system's security? That's the reason why USBGuard has been created, thus it can prevent any such attack. Furthermore it's being enhanced and maintained on a regular basis.
USBGuard is a software framework that protects your system against rogue USB devices (a.k.a. BadUSB) by implementing basic allowlisting and blocklisting capabilities. It's a great addition to anyone needing to protect a Linux system.

In this session you will be presented with a brief overview of USBGuard focusing on latest usability enhancements.

Speakers
avatar for Attila Lakatos

Attila Lakatos

Associate Software Engineer, Red Hat
I am an Associate Software Engineer at Red Hat, part of the Special Projects Team focused on productization and development of security technologies such as usbguard, sudo, aide and rsyslog.  An enthusiastic open source contributor to Linux packages  with a Master's degree focused... Read More →
ZF

Zoltan Fridrich

Intern, Red Hat
Red Hat intern in team Special Projects and a masters student at MUNI FI. Focused on software development and engineering.



Friday February 19, 2021 12:30pm - 12:55pm CET
Session Room 6

1:00pm CET

DSP - custom SELinux policy modules done right
Decentralized SELinux policy project (DSP) is here to help developers ship custom SELinux policies together with their components. This allows for each package to be tested and delivered to users together with tailor-made security policy (as opposed to waiting for a new release of distribution policy).
In this talk I will show you what this process entails, list pros and cons, and explain how it influences the rest of the system. The newest addition to DSP is a test suite aimed at secure policy writing and proper packaging practises.

Speakers
VM

Vít Mojžíš

Software Engineer, Red Hat
SELinux userspace maintainer



Friday February 19, 2021 1:00pm - 1:25pm CET
Session Room 6

2:45pm CET

Security Scanning - Past/Present/Future
How can you be sure your bare metal, virtual machines or containers are secure and do not contain any known vulnerabilities? How much can you trust your security scanner? How has the security scanning landscape changed over the years and what is next? What are the proverbial pits that security scanners often fall into? Those are some of the questions that we will try to answer in this talk. These answers largely depend on what security metadata is available for the software you are using and so we will cover common security metadata formats, sources and how to use them effectively. We will focus on standard formats such as OVAL and CVRF and several vendor sources

Speakers
avatar for Stanislav Ochotnický

Stanislav Ochotnický

Software Engineer, Red Hat Product Security DevOps, Red Hat
Stanislav has been at Red Hat for almost 11 years at this point. Starting as a maintainer within Red Hat Enterprise Linux engineering, spending a few years as a business analyst and finally returning to engineering side by joining internal tooling DevOps teams. He is currently working... Read More →
MP

Martin Prpič

Software Engineer, Red Hat
I like people, places, and things. Talk to me about anything!



Friday February 19, 2021 2:45pm - 3:25pm CET
Session Room 6

3:30pm CET

Making heads or tails of TLS certificate errors
The ecosystem of TLS certificates is rather complicated. Just OpenSSL has over 75 different possible errors only related to certificate validation, some of them somewhat cryptic. Furthermore, other libraries have incompatible error sets, complicating knowledge transfer.
Usable X.509 Errors (https://x509errors.org) is a project attempting to improve the situation. It compares errors from commonly used libraries (OpenSSL, GnuTLS, Botan, mbedTLS), consolidating the corresponding documentation from all those libraries in a single place. It tries to explain what the validation errors mean by devising better documentation and providing ready-to-use sample certificates for testing.
The presented research is a part of the academic cooperation of Red Hat Czech and Masaryk University.

Speakers
avatar for Martin Ukrop

Martin Ukrop

researcher, teacher, Masaryk University
Passionate about usable security, user experience, teaching and experiential learning. Actively organizing educational events in the community "Instruktoři Brno". Ceaselessly fascinated by the world.
avatar for Pavol Žáčik

Pavol Žáčik

Student, Masaryk University
Student, begginer security researcher at CRoCS - Masaryk University.



Friday February 19, 2021 3:30pm - 3:55pm CET
Session Room 6

4:30pm CET

Rekor - Cryptographic software release ledger
This will be a talk about a new project called 'rekor'. Rekor is a project to provide a cryptographic, immutable, append only software release ledger using merkle trees. Rekor is being developed in collaboration between Red Hat OCTO and Google.

Speakers
avatar for Luke Hinds

Luke Hinds

Senior Principal Software Engineer, Red Hat
Luke Hinds works within the Emerging Technologies group in Red Hat's CTO office, where he leads a team working on open source security. Luke started the project sigstore, alongside many other OSS security projects. He has held numerous OSS community leadership roles, such as the Kubernetes... Read More →


Friday February 19, 2021 4:30pm - 5:10pm CET
Session Room 6

5:30pm CET

Lattice Based Cryptography Primer
Of all the new post quantum algorithms we are looking at to replace our traditional RSA and Eliptic Curve systems, Lattice base algorithms are both the most promising, but also the most opaque. NIST is almost certain to choose Lattice base as one of the algorithms they plan on standardizing on in 2021. This talk will help users who have a general feel for how RSA and ECC work get that same familiarity with Lattice functions. NIST is almost certain to choose Lattice base as one of the algorithms they plan on standardizing on in 2021.

Speakers
avatar for Bob Relyea

Bob Relyea

Principal Programmer, OASIS PKCS #11 co-chair., Red Hat
Bob Relyea is a principal programmer at Red Hat working on the Network Security System Library. Bob is also the co-chair for the OASIS PKCS #11 technical committee, having worked with PKCS #11 and PKCS #11 integration into NSS since 1995.



Friday February 19, 2021 5:30pm - 6:10pm CET
Session Room 6
 
Saturday, February 20
 

9:45am CET

Ansible deployment and management updates for IdM
The talk will show the additions and enhancements for the deployment and management of IdM based solutions using Ansible with the ansible-freeipa project. This includes Ansible roles and modules to automate functions related to deployment and configuration as well as maintenance of IdM. The talk will provide an overview over new modules and roles in ansible-freeipa, like for example DNS and RBAC modules and also backup and restore roles. A demo will show the deployment of a IdM cluster with server, replicas and clients and also the use of several management modules.

Speakers
avatar for Thomas Woerner

Thomas Woerner

Principal Software Engineer, Red Hat
Principal Software Engineer



Saturday February 20, 2021 9:45am - 10:25am CET
Session Room 3

10:30am CET

Life Amongst the Authentica-ceans 🦀
Authentication and IDM technologies are at the core of our system and network security. Whether it's logging into our personal laptop, or a corporate website, authentication is how we define roles and privileges to our users and ourselves. Opensource has a number of IDM offerings, as do corporate offerings. In this talk, we'll explore some of the history of these projects and what they offer, the direction that authentication and security is moving in. We'll also introduce Kanidm, a new opensource IDM system that has been created to adapt to these changes in IDM and security, and talk about what it's achieved in a short space of time, and what the future holds for it.

Speakers
avatar for William Brown

William Brown

Senior Software Engineer, SUSE
Identity Management, LDAP, Security, Rust


Saturday February 20, 2021 10:30am - 10:55am CET
Session Room 3

11:30am CET

Enarx for Confidential Computing
Enarx is an open source project to allow you to deploy sensitive workloads on untrusted hosts in the public cloud, private cloud, Edge, IoT - wherever! We use TEEs (Trusted Execution Environments) such as Intel's SGX and AMD's SEV to deploy into "Keeps", confidentiality and integrity protected WebAssembly run-times. In this talk, we'll give a demo of the latest state, and discuss architecture and some of the more tricky implementation details. A knowledge of systems programming, Rust, micro-kernels, syscalls, WebAssembly, trust management or distributed client-server architecture might be helpful, but we don't expect you to be an expert in all (or any!) of them.

Speakers
avatar for Mike Bursell

Mike Bursell

Executive Director, Confidential Computing Consortium
Mike Bursell is the Executive Director of the Confidential Computing Consortium. He is one of the co-founders of the Enarx project (https://enarx.dev), and was CEO and co-founder of Profian, a start-up based on Enarx. After training in software engineering, he specialised in distributed... Read More →
avatar for Nathaniel McCallum

Nathaniel McCallum

Senior Principal Software Engineer, Red Hat, Inc.
Nathaniel is a Principal Software Engineer for Red Hat's Security and Identity group. By day, he tackles tough security problems. By night, he tackles his five children. He is the author of a variety of security related technologies, including: 2FA for Fr


Saturday February 20, 2021 11:30am - 12:10pm CET
Session Room 3

12:15pm CET

Security benefits of using FreeIPA/IDM
In the presentation we will cover:
1. What is FreeIPA
2. What are use-cases [Integrations]
3. Security benefits of FreeIPA, i.e how IPA can be used to build security within Environment
4. Future scope of FreeIPA moving forward

Speakers
avatar for Hemant Khot

Hemant Khot

STSE, Red Hat
Working as TSE for IDM in Red Hat since last 3 year.


Saturday February 20, 2021 12:15pm - 12:40pm CET
Session Room 3

12:45pm CET

Using RHEL built-in Security Technologies daily
In this session we are going to show you how easy it can be to raise the security of your system using readily available technologies. We will guide you through it via a presentation and demos which will enable you to set up an environment capable of allowing users to do certain administrative actions, rejecting unwanted usb devices or allowing only trusted application to be executed, automatically unlocking encrypted drives at boot time under specific conditions or collecting system logs centrally over a secure channel. We are also going to shed some light on the efforts we devote to keeping and even improving the level of quality RHEL is known for.

Speakers
SC

Sergio Correira

Sr. Software Engineer, Red Hat, Inc.
Sergio Correia is a Software Engineer with the Special Projects team, at Red Hat's Linux Security group.
avatar for Dalibor Pospisil

Dalibor Pospisil

quality engineer, Red Hat



Saturday February 20, 2021 12:45pm - 1:25pm CET
Session Room 3

2:00pm CET

Closing gaps in strong auth: FIDO2 device support
Over the past few years, major websites started offering a 2-factor authentication option based on hardware devices. The latest effort in this area is FIDO2, which comprises two closely related standards: WebAuthn for communicating between websites and a client (web browser), and CTAP2 (Client To Authenticator Protocol) for interacting with authenticator devices.

On the client side, however, there is still room for improvement. Although major web browsers have already adopted the CTAP2 protocol, they currently require direct access to the devices through a low-level transport such as USB HID. This can be problematic when authentication is required inside an isolated environment, such as in a sandbox or container: the application provider would have to request full access to USB, whereas its usage is sorely for user authentication.

To mitigate this situation, we have implemented a proxy service that allows applications to access CTAP2 authenticator devices in a secure manner. With this service, the host has fine grained access control over authenticator devices, while the applications can take advantage of the device discovery mechanism provided by the host. In this talk, we will look at the design of the proxy service considering potential use-cases and challenges in terms of security. If time allows, we will show a demonstration using the current state of implementation.

The slides can be built at: https://gitlab.com/npocs/presentation-devconf-2021

Speakers
avatar for Daiki Ueno

Daiki Ueno

Principal Software Engineer, Red Hat
Daiki Ueno works as a software engineer in the RHEL Crypto team at Red Hat, where he leads the development of low-level cryptographic libraries, such as GnuTLS and p11-kit, while helping a variety of security related projects.
avatar for Norbert Pócs

Norbert Pócs

Associate, Red Hat
Red Hat Crypto Team memberStudent at FIT BUT


fido2 webm

Saturday February 20, 2021 2:00pm - 2:25pm CET
Session Room 3
 
  • Timezone
  • Filter By Date DevConf.cz 2021 Feb 18 -20, 2021
  • Filter By Venue hopin.to
  • Filter By Type
  • Agile DevOps
  • Bughunting
  • Cloud and Containers
  • Community
  • Community Booths
  • Debug / Tracing
  • Desktop
  • Developer Tools
  • Documentation
  • Fedora
  • Frontend / UI / UX
  • Immutable OS
  • IoT
  • Kernel
  • Meetup
  • Microservices
  • Middleware
  • ML / AI / Big Data
  • Networking
  • Platform / OS
  • Quality / Testing
  • Security / IdM
  • Storage / Ceph / Gluster
  • Virtualization
  • Workshop

Filter sessions
Apply filters to sessions.