yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #13016
[Bug 1301838] [NEW] SG rule should not allow an ICMP Policy when icmp-code alone is provided.
Public bug reported:
When we add an Security Group ICMP rule with icmp-type/code, the rule
gets added properly and it translates to an appropriate firewall policy.
It was noticed that when adding a security group rule, without providing the icmp-type and only providing the icmp-code, there is no error.
But the iptables rule that gets added is a generic one.
Example:
neutron --debug security-group-rule-create 4b3a5866-8cdd-4e15-b51b-9523ede2f6f8 --protocol icmp --direction ingress --ethertype ipv4 --port-range-max 4
translates to a iptables rule like
-A neutron-openvswi-i49e920d5-c -p icmp -j RETURN
The Security Group rules listing in Horizon/neutron-client display the icmp rule with port-range as None-<icmp-code>.
This could be misleading as it is inconsistent.
It would be good if validation is done when "--port-range-max" is passed without providing the "--port-range-min" so that SG Group rules are consistent with the iptable rules that are added.
** Affects: neutron
Importance: Undecided
Assignee: Sridhar Gaddam (sridhargaddam)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Sridhar Gaddam (sridhargaddam)
** Description changed:
- When we add an Security Group ICMP Policy with icmp-type/code, the
- policy gets added properly and it translates to an appropriate firewall
- policy.
+ When we add an Security Group ICMP rule with icmp-type/code, the rule
+ gets added properly and it translates to an appropriate firewall policy.
- It was noticed that when adding a security group policy, without providing the icmp-type and only providing the icmp-code, there is no error.
- But the iptables rule that gets added is a generic one.
+ It was noticed that when adding a security group rule, without providing the icmp-type and only providing the icmp-code, there is no error.
+ But the iptables rule that gets added is a generic one.
Example:
neutron --debug security-group-rule-create 4b3a5866-8cdd-4e15-b51b-9523ede2f6f8 --protocol icmp --direction ingress --ethertype ipv4 --port-range-max 4
- translates to a iptables rule like
- -A neutron-openvswi-i49e920d5-c -p icmp -j RETURN
+ translates to a iptables rule like
+ -A neutron-openvswi-i49e920d5-c -p icmp -j RETURN
- The Security Group rules listing in Horizon/neutron-client display the icmp rule with port-range as None-<icmp-code>.
- This could be misleading as it is inconsistent.
+ The Security Group rules listing in Horizon/neutron-client display the icmp rule with port-range as None-<icmp-code>.
+ This could be misleading as it is inconsistent.
It would be good if validation is done when "--port-range-max" is passed without providing the "--port-range-min" so that SG Group rules are consistent with the iptable rules that are added.
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1301838
Title:
SG rule should not allow an ICMP Policy when icmp-code alone is
provided.
Status in OpenStack Neutron (virtual network service):
New
Bug description:
When we add an Security Group ICMP rule with icmp-type/code, the rule
gets added properly and it translates to an appropriate firewall
policy.
It was noticed that when adding a security group rule, without providing the icmp-type and only providing the icmp-code, there is no error.
But the iptables rule that gets added is a generic one.
Example:
neutron --debug security-group-rule-create 4b3a5866-8cdd-4e15-b51b-9523ede2f6f8 --protocol icmp --direction ingress --ethertype ipv4 --port-range-max 4
translates to a iptables rule like
-A neutron-openvswi-i49e920d5-c -p icmp -j RETURN
The Security Group rules listing in Horizon/neutron-client display the icmp rule with port-range as None-<icmp-code>.
This could be misleading as it is inconsistent.
It would be good if validation is done when "--port-range-max" is passed without providing the "--port-range-min" so that SG Group rules are consistent with the iptable rules that are added.
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1301838/+subscriptions
Follow ups
References