← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 2091536] [NEW] Users of RBAC-shared networks can add their own router to bypass fwaas restrictions

 

Public bug reported:

I don't believe this is a bug as such, but additional policy in this
area could be helpful.

We have a set of networks which are created against an admin project,
and then shared into other projects via RBAC as required. The admin
project creates a router for the networks, and we use FWaaS to restrict
inbound/outbound traffic via the router. This is being used in the
context of Ironic nodes which don't have security groups, and some VLAN
networks with additional hardware devices present.

We have noted that a user in a project which has access to the network
via RBAC can create an additional router and attach it to the network,
provided they do so by port rather than subnet as this won't use the
subnet's 'gateway IP'. The user can then associate floating IPs via
their router, and establish inbound and outbound connectivity provided
they override the DHCP-provided gateway address.

In order to work around this, we have modified code to restrict
attaching router interfaces to the network owner (admin in this case).
It wasn't possible to achieve this via the 'add_router_interface' policy
as the policy relates to the owner of the router rather than the owner
of the network. It would be helpful if the policy mechanism had the
means to address this.

** Affects: neutron
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2091536

Title:
  Users of RBAC-shared networks can add their own router to bypass fwaas
  restrictions

Status in neutron:
  New

Bug description:
  I don't believe this is a bug as such, but additional policy in this
  area could be helpful.

  We have a set of networks which are created against an admin project,
  and then shared into other projects via RBAC as required. The admin
  project creates a router for the networks, and we use FWaaS to
  restrict inbound/outbound traffic via the router. This is being used
  in the context of Ironic nodes which don't have security groups, and
  some VLAN networks with additional hardware devices present.

  We have noted that a user in a project which has access to the network
  via RBAC can create an additional router and attach it to the network,
  provided they do so by port rather than subnet as this won't use the
  subnet's 'gateway IP'. The user can then associate floating IPs via
  their router, and establish inbound and outbound connectivity provided
  they override the DHCP-provided gateway address.

  In order to work around this, we have modified code to restrict
  attaching router interfaces to the network owner (admin in this case).
  It wasn't possible to achieve this via the 'add_router_interface'
  policy as the policy relates to the owner of the router rather than
  the owner of the network. It would be helpful if the policy mechanism
  had the means to address this.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2091536/+subscriptions