← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1463589] Re: rules referencing security group members expose VMs in overlapping IP scenarios

 

[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
       Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1463589

Title:
  rules referencing security group members expose VMs in overlapping IP
  scenarios

Status in neutron:
  Expired

Bug description:
  create SG1 an SG2 that only allow traffic to members of their own group
  create two networks with same 10.0.0.0/24 CIDR
  create port1 in SG1 on net1 with IP 10.0.0.1
  create port2 in SG1 on net2 with IP 10.0.0.2
  create port3 in SG2 on net1 with IP 10.0.0.2

  port1 can communicate with port3 because of the allow rule for port2's
  IP

  This violates the constraints of the configured security groups.

  Another incarnation of the bug happens if you:

  (graphic representation: https://bugs.launchpad.net/neutron/+bug/1463589/+attachment/4416693/+files/sg-disjoint-networks-bug-with-router.png)
  create SG1 and SG2, that only allow traffic to members of their own group
  create two network (N1, N2) segments
  create another network segment (N3)
  add a router R that connects the N1 to N3

  then add IPa, IPb to SG1 on N1
  add IPc, IPd to SG1 on N2

  then add IPc and IPd to SG2 on N3

  IPa, and IPb will accept traffic from ports with IPc and IPd on SG2
  even if they should not.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1463589/+subscriptions


References