yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #62869
[Bug 1518296] Re: Non snated packet should be blocked
[Expired for neutron because there has been no activity for 60 days.]
** Changed in: neutron
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1518296
Title:
Non snated packet should be blocked
Status in neutron:
Expired
Bug description:
Some deployments would like to use only floating ip to communicate
with outside of tenant via external network.
However, in current neutron, when running "neutron router-gateway-set"
with specified router's "enable_snat" is false, then non-SNAT'ed
packets can arrive at other tenant via external-network. The packets
don't pass through other tenant's gateway, but take extra load to
external network.
The packet should be NAT'ed when flowing on external network. Non-
SNAT'ed packets don't need to flow on external network.
Therefore, non-SNAT'ed packets should be dropped at inside of own
tenant.
I will fix as follows:
* The router is Legacy mode and enable_snat is True:
No change from current implementation.
* The router is Legacy mode and enable_snat is False:
Add new rule for dropping outbound non-SNAT'ed packets.
* The router is DVR mode and enable_snat is True:
No change from current implementation.
* The router is Legacy mode and enable_snat is False:
Don't create SNAT name space.
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1518296/+subscriptions
References