← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1518296] [NEW] Non snated packet should be blocked

 

Public bug reported:

In current neutron, when running "neutron router-gateway-set" with
specified router's "enable_snat" is false, then non-SNAT'ed packets can
arrive at other tenant via external-network.  The packets don't pass
through other tenant's gateway, but take extra load to external network.

The packet should be NAT'ed when flowing on external network.  Non-
SNAT'ed packets don't need to flow on external network.

Therefore, non-SNAT'ed packets should be dropped at inside of own
tenant.

I will fix as follows:

  * The router is Legacy mode and enable_snat is True:
    No change from current implementation.

  * The router is Legacy mode and enable_snat is False:
    Add new rule for dropping outbound non-SNAT'ed packets.

  * The router is DVR mode and enable_snat is True:
    No change from current implementation.

  * The router is Legacy mode and enable_snat is False:
    Don't create SNAT name space.

** Affects: neutron
     Importance: Undecided
     Assignee: Takanori Miyagishi (miyagishi-t)
         Status: New

** Changed in: neutron
     Assignee: (unassigned) => Takanori Miyagishi (miyagishi-t)

** Description changed:

- In current neutron, when running "neutron router-gateway-set" with specified
- router's "enable_snat" is false, then non-SNAT'ed packets can arrive at other
- tenant via external-network.  The packets don't pass through other tenant's
- gateway, but take extra load to external network.
+ In current neutron, when running "neutron router-gateway-set" with
+ specified router's "enable_snat" is false, then non-SNAT'ed packets can
+ arrive at other tenant via external-network.  The packets don't pass
+ through other tenant's gateway, but take extra load to external network.
  
- The packet should be NAT'ed when flowing on external network.
- Non-SNAT'ed packets don't need to flow on external network.
+ The packet should be NAT'ed when flowing on external network.  Non-
+ SNAT'ed packets don't need to flow on external network.
  
  Therefore, non-SNAT'ed packets should be dropped at inside of own
  tenant.
  
  I will fix as follows:
  
-   * The router is Legacy mode and enable_snat is True:
-     No change from current implementation.
-  
-   * The router is Legacy mode and enable_snat is False:
-     Add new rule for dropping outbound non-SNAT'ed packets.
+   * The router is Legacy mode and enable_snat is True:
+     No change from current implementation.
  
-   * The router is DVR mode and enable_snat is True:
-     No change from current implementation.
-     
-   * The router is Legacy mode and enable_snat is False:
-     Don't create SNAT name space.
+   * The router is Legacy mode and enable_snat is False:
+     Add new rule for dropping outbound non-SNAT'ed packets.
+ 
+   * The router is DVR mode and enable_snat is True:
+     No change from current implementation.
+ 
+   * The router is Legacy mode and enable_snat is False:
+     Don't create SNAT name space.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1518296

Title:
  Non snated packet should be blocked

Status in neutron:
  New

Bug description:
  In current neutron, when running "neutron router-gateway-set" with
  specified router's "enable_snat" is false, then non-SNAT'ed packets
  can arrive at other tenant via external-network.  The packets don't
  pass through other tenant's gateway, but take extra load to external
  network.

  The packet should be NAT'ed when flowing on external network.  Non-
  SNAT'ed packets don't need to flow on external network.

  Therefore, non-SNAT'ed packets should be dropped at inside of own
  tenant.

  I will fix as follows:

    * The router is Legacy mode and enable_snat is True:
      No change from current implementation.

    * The router is Legacy mode and enable_snat is False:
      Add new rule for dropping outbound non-SNAT'ed packets.

    * The router is DVR mode and enable_snat is True:
      No change from current implementation.

    * The router is Legacy mode and enable_snat is False:
      Don't create SNAT name space.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1518296/+subscriptions


Follow ups