& cplSiteName &

OpenDaylight Looks to Get Ahead on Security

Mitch Wagner
2/2/2015
50%
50%

OpenDaylight is implementing a "world-class" security process, after an embarrassing faux pas left a security hole unpatched for months, an OpenDaylight security team member says.

The OpenDaylight Security Response Team published its first new vulnerability report January 22 through the new process, coordinating disclosure with vendors and stakeholders with proper embargoes.

"From my perspective, the security response function is done," says team member David Jorm, product security engineer for IIX, an Internet peering provider. "It needs to be properly maintained. Obviously it can't be left to rot. We just have to keep it ticking along in the way it's set up."

The team and new process comes after OpenDaylight took four months to patch a serious vulnerability, reported by a security consultant over the summer and virtually ignored until the OpenDaylight Project finally patched the hole in December. (See OpenDaylight Patches 'Serious Vulnerability' – After Four Months.)

Although the security flaw never made it into production code from vendors, it underscored the need for a formal security process and team, set up in December. (See OpenDaylight Establishes Security Team.)

The team includes representatives of major OpenDaylight vendors, including Chris Wright, technical director of SDN at Red Hat Inc. (NYSE: RHT) and member of the OpenDaylight board; Ed Warnicke, principal engineer in the Research and Advanced Development group at Cisco Systems Inc. (Nasdaq: CSCO) and member of the OpenDaylight Technical Steering Committee; Ryan Moats, senior software engineer at IBM Corp. (NYSE: IBM) and TSC member; and Cisco's Robert Varga.

The OpenDaylight security process is roughly based on the procedure used by the OpenStack Security Vulnerability Management Team.

The next step is to set up a proactive security process. "What we have now is a world-class security response function," Jorm says -- to respond to vulnerability in published code. A proactive process will reduce security vulnerabilities in code before it ships. "It turns out that's really hard. It's something that proprietary software and open source projects have struggled with."

Tools to automate finding security vulnerabilities are coming to the fore, Jorm says. Ten years ago, the tools were not so great. "You could point a scanner at a network and get a list of 10,000 theoretical vulnerabilities," he says. That wasn't useful. Now, static analysis tools can parse code and highlight potential vulnerabilities without a high false positive rate. "It's ripe for us to automate that."

Also, currently available build tools have static analysis tests built in. When developers build the code, if the security test fails the build fails. Jorm would like to implement those kinds of tools for OpenDaylight.


Want to know more about SDN? Visit Light Reading's SDN technology content channel.


OpenDaylight also needs automated tools to scan for vulnerabilities in dependent packages in OpenDaylight -- prepackaged code developed outside the OpenDaylight process. "You can't expect the developers to subscribe to all those those mailing lists. Nobody does that," Jorm says. The process of finding vulnerabilities in dependent packages has to be automated.

Other steps include documenting security best practices, and eliminating default credentials for OpenDaylight that users might not change, leaving vulnerabilities, Jorm says.

Security in open source software like OpenDaylight becomes more important as more network operators move to directly connect their networks to cloud providers to improve performance and availability, says IIX CTO Paul Gampe. Those network connections and the cloud platforms are built using open source, therefore open source security is criical. "If we're going to make open source networking of value to the network, it needs to be more secure," Gampe says.

— Mitch Wagner, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profileFollow me on Facebook, West Coast Bureau Chief, Light Reading. Got a tip about SDN or NFV? Send it to wagner@lightreading.com.

(2)  | 
Comment  | 
Print  | 
Oldest First  |  Newest First  |  Threaded View        ADD A COMMENT
Umesh Jamwal
50%
50%
Umesh Jamwal,
User Rank: Light Beer
2/2/2015 | 9:03:54 AM
Exploit attacks on Opensource
We really wonder how to address the exploit attacks,bots,malicious malware> 50+million exploit attacks are happening at any given time,impacting the internet fabric and its components-DNS/DHCP,SNMP,NetBIOS etc.Opensource Forum should address the inside-out vulnerability....Would appreciate if somebody has an answer at this time...Thanks...
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
2/2/2015 | 10:44:03 AM
Re: Exploit attacks on Opensource
I don't think there's a magic bullet to stop these kinds of attacks. It takes the kind of work OpenDaylight is doing. 
From The Founder
Kicking off BCE 2017, Light Reading founder Steve Saunders lays blame for NFV's slow ramp-up and urges telecom to return to old-fashioned standards building and interoperability.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Interviews
CenturyLink: Let's Get Past SD-WAN Hype

6|23|17   |   04:02   |   (0) comments


Technology becomes a "shiny object" unless it's properly focused on solving business needs for enterprise customers, says Bill Grubbs, network solutions architect for CenturyLink. He explains to Light Reading why SD-WAN deployments have to be tailored to specific needs – and more.
Women in Comms Introduction Videos
Infinera's Sales Director Paints Tech's Big Picture

6|21|17   |   4:14   |   (1) comment


Shannon Williams, Infinera's director of sales, shares how she achieves work's many balancing acts -- between her role and the broader company, today and tomorrow's tech and more.
LRTV Custom TV
SD-WAN Innovation & Trends

6|20|17   |     |   (0) comments


Versa CEO Kelly Ahuja discusses with Carol Wilson the current status and trends in the SD-WAN market, Versa's innovation around building a software platform with broad contextualization, and the advantages that startups can bring to the SD-WAN market.
LRTV Interviews
Ovum's Dario Talmesio on 5G in Europe

6|20|17   |   02:16   |   (0) comments


At 5G World 2017, Dario Talmesio, principal analyst and practice leader on Ovum's fixed and mobile telecoms European team, explains the emerging trends amongst European operators as they prepare for 5G.
LRTV Custom TV
Putting Power on a Pedestal

6|19|17   |     |   (0) comments


ARRIS's John Ulm says a major accomplishment of SCTE•ISBE's Energy 2020 program is increased focus on power cost and consumption, including inclusion of energy requirements in operators' RFPs and RFIs.
LRTV Custom TV
Gigabit Access: The Last-Mile Pipe for All Future Services

6|19|17   |     |   (0) comments


A Gigabit access platform being deployed today must be able to deliver all types of services to an increasing number of devices. A non-blocking architecture is necessary to support the ever-increasing growth in bandwidth demand. The Huawei Gigabit access solution is based on a distributed design that is fully scalable to deliver a unprecedented performance.
LRTV Custom TV
Key Factors to Successfully Deploy an SD-WAN Service

6|19|17   |     |   (0) comments


As service providers transition their SD-WAN solution from trials and limited deployments into production at large scale, there are important considerations to successfully operationalize these solutions and realize their full potential, without adding complexity, introducing uncertainty or disrupting current business operations. Sunil Khandekar, CEO and Founder ...
LRTV Custom TV
IoT Solutions: Rational Exuberance

6|19|17   |     |   (0) comments


IoT solutions are morphing from hype into viable business opportunities. Huawei has the platform and ecosystem support to help carriers successfully address new business opportunities in the IoT space.
LRTV Custom TV
Realizing ICN as a Network Slice for Mobile Data Distribution

6|19|17   |     |   (1) comment


Network slicing in 5G allows the potential introduction of new network architectures such as Information-centric Networks (ICN) as a slice, managed over a shared pool of compute, storage and bandwidth resource. Services over an ICN slice can benefit from many architectural features such as Name Based Networking, Security, Multicasting, Multi-homing, Mobility, ...
LRTV Interviews
Ovum's Mike Roberts on 5G Uptake

6|19|17   |   04:08   |   (0) comments


Mike Roberts, research director for Ovum's service provider markets group, explains why he has boosted his 5G subscriptions forecast.
LRTV Interviews
AT&T's Hubbard on Intersection of SD-WAN & MPLS

6|15|17   |     |   (0) comments


Rick Hubbard, SVP of Network Product Management for AT&T Business Solutions, discusses how AT&T's approach to SD-WAN fits in with its overall virtualization strategy, explains how SD-WAN can improve enterprise customers' use of the cloud and addresses the intersection of SD-WAN and MPLS.
Telecom Innovators Video Showcase
Keep Connected IoT Devices Under Control With Allot

6|15|17   |     |   (0) comments


Allot AVP of International Pre-Sales, Daniel Keidar, explains how communications service providers can protect infrastructure and service availability from flooding attacks caused by malfunctioning or bot-infected devices connected to their network.
Upcoming Live Events
October 18, 2017, Colorado Convention Center - Denver, CO
November 1, 2017, The Montcalm Marble Arch
November 1, 2017, The Montcalm Marble Arch
November 30, 2017, The Westin Times Square
All Upcoming Live Events
Infographics
With the mobile ecosystem becoming increasingly vulnerable to security threats, AdaptiveMobile has laid out some of the key considerations for the wireless community.
Hot Topics
Netflix's Lesson in Culture Expectation Settings
Sarah Thomas, Director, Women in Comms, 6/21/2017
No Imagination: UK Chip Biz Goes Up for Sale
Iain Morris, News Editor, 6/22/2017
Kalanick Steps Down as Uber CEO
Sarah Thomas, Director, Women in Comms, 6/21/2017
BT Tech Chief Makes Plea to 5G Chip Vendors
Ray Le Maistre, International Group Editor, 6/20/2017
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
Following a recent board meeting, the New IP Agency (NIA) has a new strategy to help accelerate the adoption of NFV capabilities, explains the Agency's Founder and Secretary, Steve Saunders.
One of the nice bits of my job (other than the teeny tiny salary, obviously) is that I get to pick and choose who I interview for this slot on the Light Reading home ...
Animals with Phones
Live Digital Audio

Playing it safe can only get you so far. Sometimes the biggest bets have the biggest payouts, and that is true in your career as well. For this radio show, Caroline Chan, general manager of the 5G Infrastructure Division of the Network Platform Group at Intel, will share her own personal story of how she successfully took big bets to build a successful career, as well as offer advice on how you can do the same. We’ll cover everything from how to overcome fear and manage risk, how to be prepared for where technology is going in the future and how to structure your career in a way to ensure you keep progressing. Chan, a seasoned telecom veteran and effective risk taker herself, will also leave plenty of time to answer all your questions live on the air.