yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #41577
[Bug 1518296] [NEW] Non snated packet should be blocked
Public bug reported:
In current neutron, when running "neutron router-gateway-set" with
specified router's "enable_snat" is false, then non-SNAT'ed packets can
arrive at other tenant via external-network. The packets don't pass
through other tenant's gateway, but take extra load to external network.
The packet should be NAT'ed when flowing on external network. Non-
SNAT'ed packets don't need to flow on external network.
Therefore, non-SNAT'ed packets should be dropped at inside of own
tenant.
I will fix as follows:
* The router is Legacy mode and enable_snat is True:
No change from current implementation.
* The router is Legacy mode and enable_snat is False:
Add new rule for dropping outbound non-SNAT'ed packets.
* The router is DVR mode and enable_snat is True:
No change from current implementation.
* The router is Legacy mode and enable_snat is False:
Don't create SNAT name space.
** Affects: neutron
Importance: Undecided
Assignee: Takanori Miyagishi (miyagishi-t)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Takanori Miyagishi (miyagishi-t)
** Description changed:
- In current neutron, when running "neutron router-gateway-set" with specified
- router's "enable_snat" is false, then non-SNAT'ed packets can arrive at other
- tenant via external-network. The packets don't pass through other tenant's
- gateway, but take extra load to external network.
+ In current neutron, when running "neutron router-gateway-set" with
+ specified router's "enable_snat" is false, then non-SNAT'ed packets can
+ arrive at other tenant via external-network. The packets don't pass
+ through other tenant's gateway, but take extra load to external network.
- The packet should be NAT'ed when flowing on external network.
- Non-SNAT'ed packets don't need to flow on external network.
+ The packet should be NAT'ed when flowing on external network. Non-
+ SNAT'ed packets don't need to flow on external network.
Therefore, non-SNAT'ed packets should be dropped at inside of own
tenant.
I will fix as follows:
- * The router is Legacy mode and enable_snat is True:
- No change from current implementation.
-
- * The router is Legacy mode and enable_snat is False:
- Add new rule for dropping outbound non-SNAT'ed packets.
+ * The router is Legacy mode and enable_snat is True:
+ No change from current implementation.
- * The router is DVR mode and enable_snat is True:
- No change from current implementation.
-
- * The router is Legacy mode and enable_snat is False:
- Don't create SNAT name space.
+ * The router is Legacy mode and enable_snat is False:
+ Add new rule for dropping outbound non-SNAT'ed packets.
+
+ * The router is DVR mode and enable_snat is True:
+ No change from current implementation.
+
+ * The router is Legacy mode and enable_snat is False:
+ Don't create SNAT name space.
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1518296
Title:
Non snated packet should be blocked
Status in neutron:
New
Bug description:
In current neutron, when running "neutron router-gateway-set" with
specified router's "enable_snat" is false, then non-SNAT'ed packets
can arrive at other tenant via external-network. The packets don't
pass through other tenant's gateway, but take extra load to external
network.
The packet should be NAT'ed when flowing on external network. Non-
SNAT'ed packets don't need to flow on external network.
Therefore, non-SNAT'ed packets should be dropped at inside of own
tenant.
I will fix as follows:
* The router is Legacy mode and enable_snat is True:
No change from current implementation.
* The router is Legacy mode and enable_snat is False:
Add new rule for dropping outbound non-SNAT'ed packets.
* The router is DVR mode and enable_snat is True:
No change from current implementation.
* The router is Legacy mode and enable_snat is False:
Don't create SNAT name space.
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1518296/+subscriptions
Follow ups