← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 2054324] Re: Iptables rule wrong if created a rule with protocol 4

 

Reviewed:  https://review.opendev.org/c/openstack/neutron/+/911154
Committed: https://opendev.org/openstack/neutron/commit/cd1d191e335dca707ac9324fd81e642cb453a6cf
Submitter: "Zuul (22348)"
Branch:    master

commit cd1d191e335dca707ac9324fd81e642cb453a6cf
Author: Brian Haley <haleyb.dev@xxxxxxxxx>
Date:   Tue Mar 5 11:59:05 2024 -0500

    Use the system-dependent string for IP protocol 4
    
    iptables-save uses a system-dependent value, usually that
    found in /etc/protocols, when 'ipip' is given as the
    security group protocol. The intent is to always use the
    string value for IP protocol '4', as iptables-save has no
    '-n' flag to print values numerically.
    
    This updates a previous change (793dfb04d) that hard-coded
    that string to 'ipencap', which broke CentOS/Fedora, which
    uses 'ipv4'.
    
    For this reason we cannot hard-code anything in neutron-lib,
    this needs to be added dynamically, so this one-line change
    needs to stay here, and effectively closes the bug.
    
    Closes-bug: #2054324
    Change-Id: Ic40b539c9ef5cfa4cbbd6575e19e653342e8342b


** Changed in: neutron
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2054324

Title:
  Iptables rule wrong if created a rule with protocol 4

Status in neutron:
  Fix Released

Bug description:
  I followed this document to create security group rule for requirement "Allow ingress Protocol IPIP or 4" and I used "ipip" value
  https://docs.openstack.org/api-ref/network/v2/index.html#create-security-group-rule
  btw I expected my iptables rule on nova compute is "-A INPUT -s 172.16.2.0/24 -p 4 -j ACCEPT" but the runtime rule in kernel was "-A INPUT -s 172.16.2.0/24 -p ipip -j ACCEPT" and proto number was 94 not 4

  // the rules output for one port
  Chain neutron-linuxbri-idf95737e-7 (1 references)
   pkts bytes target     prot opt in     out     source               destination
   115K  219M RETURN     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED /* Direct packets associated with a known session to the RETURN chain. */
      0     0 RETURN     udp  --  *      *       0.0.0.0/0            172.16.2.165         udp spt:67 dpt:68
      0     0 RETURN     udp  --  *      *       0.0.0.0/0            255.255.255.255      udp spt:67 dpt:68
      0     0 RETURN     94   --  *      *       172.16.2.0/24        0.0.0.0/0
      0     0 RETURN     udp  --  *      *       172.16.2.0/24        0.0.0.0/0            udp dpt:8472
      0     0 RETURN     tcp  --  *      *       172.16.2.0/24        0.0.0.0/0            tcp dpt:4240
      0     0 RETURN     udp  --  *      *       172.16.2.0/24        0.0.0.0/0            udp multiport dports 30000:32767
      1    90 RETURN     tcp  --  *      *       172.16.2.0/24        0.0.0.0/0            tcp dpt:10250
      0     0 RETURN     tcp  --  *      *       172.16.2.0/24        0.0.0.0/0            tcp dpt:4245
    512 30720 RETURN     tcp  --  *      *       172.16.2.0/24        0.0.0.0/0            tcp multiport dports 30000:32767
      0     0 RETURN     icmp --  *      *       172.16.2.0/24        0.0.0.0/0
      0     0 RETURN     udp  --  *      *       172.16.2.0/24        0.0.0.0/0            udp dpt:4789
      0     0 RETURN     tcp  --  *      *       172.16.2.0/24        0.0.0.0/0            tcp dpt:4244
      2   142 RETURN     tcp  --  *      *       172.16.2.0/24        0.0.0.0/0            tcp dpt:179
      0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0            state INVALID /* Drop packets that appear related to an existing connection (e.g. TCP ACK/FIN) but do not have an entry in conntrack. */
     14  2122 neutron-linuxbri-sg-fallback  all  --  *      *       0.0.0.0/0            0.0.0.0/0            /* Send unmatched traffic to the fallback chain. */

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2054324/+subscriptions



References