Activity log for bug #1622657

Date Who What changed Old value New value Message
2016-09-12 15:51:53 Danil Akhmetov bug added bug
2016-09-13 09:17:36 Ann Taraday mos: status New Incomplete
2016-10-14 13:01:10 Vitaly Sedelnik mos: status Incomplete Confirmed
2016-10-14 13:01:25 Vitaly Sedelnik mos: importance Undecided High
2016-10-14 13:01:36 Vitaly Sedelnik mos: assignee MOS Neutron (mos-neutron)
2016-10-14 13:02:00 Vitaly Sedelnik nominated for series mos/9.x
2016-10-14 13:02:00 Vitaly Sedelnik bug task added mos/9.x
2016-10-14 13:02:00 Vitaly Sedelnik nominated for series mos/7.0.x
2016-10-14 13:02:00 Vitaly Sedelnik bug task added mos/7.0.x
2016-10-14 13:02:00 Vitaly Sedelnik nominated for series mos/8.0.x
2016-10-14 13:02:00 Vitaly Sedelnik bug task added mos/8.0.x
2016-10-14 13:02:17 Vitaly Sedelnik mos/9.x: milestone 10.0 9.2
2016-10-14 13:02:22 Vitaly Sedelnik mos/7.0.x: status New Confirmed
2016-10-14 13:02:25 Vitaly Sedelnik mos/8.0.x: status New Confirmed
2016-10-14 13:02:28 Vitaly Sedelnik mos/7.0.x: importance Undecided High
2016-10-14 13:02:30 Vitaly Sedelnik mos/8.0.x: importance Undecided High
2016-10-14 13:02:39 Vitaly Sedelnik mos/7.0.x: assignee MOS Maintenance (mos-maintenance)
2016-10-14 13:02:51 Vitaly Sedelnik mos/8.0.x: assignee MOS Maintenance (mos-maintenance)
2016-10-14 13:02:57 Vitaly Sedelnik mos/7.0.x: milestone 7.0-updates
2016-10-14 13:03:01 Vitaly Sedelnik mos/8.0.x: milestone 8.0-updates
2016-11-15 13:39:19 Ann Taraday description It's a customer-found issue. The issue is reproducible on MOS 10.0 as well. Summary: Security Group doesn't work if the specific allowed-address-pairs value is set to the port associated with it. High level description: OpenStack user is allowed to specify arbitrary mac_address/ip_address pairs that are allowed to pass through a port. For some practical reasons, OpenStack users can specify huge subnets, and CIRDs provided there are not sanitized. If the CIRD provided with 'allowed-address-pairs' for any single port associated with Security Group overlaps with a subnet used by the VM, the VM is always accessible by any port and any protocol, despite the fact that its security group denies all ingress traffic. Step-by-step reproduction process: 1) Create a VM in OpenStack 2) Check that there are no rules allowing icmp (for instance) in the security group associated with the VM 3) perform: neutron port-update [any-port-associated-with-the-secgroup] --allowed-address-pairs type=dict list=true ip_address=[a-very-huge-cidr] if your VM uses a private IPv4 address from networks 192.168.x or 172.16.x, then 128.0.0.0/1 will work as "a-very-huge-cidr", if it uses 10.x network then 0.0.0.0/1 should. 4) ping all the VMs in this secgroup successfully (from router namespace, or from any host which is allowed to access floating IPs if floating IP is also assigned to the VM), as well as access it by any port and protocol which the VM is listening. Version: All OpenStack releases up to Mitaka. Perceived severity: It's not a blocker as workaround are pretty obvious, but it's a huge security bug: all the network security provided by Security Groups might be ruined easily, just by updating a single port in neutron. If we restrict the value of allowed-address-pairs in neutron to a single address (/32 or /128), might it break anything? It's a customer-found issue. The issue is reproducible on MOS 10.0 as well. Summary: Security Group doesn't work if the specific allowed-address-pairs value is set to the port associated with it. High level description: OpenStack user is allowed to specify arbitrary mac_address/ip_address pairs that are allowed to pass through a port. For some practical reasons, OpenStack users can specify huge subnets, and CIRDs provided there are not sanitized. If the CIRD provided with 'allowed-address-pairs' for any single port associated with Security Group overlaps with a subnet used by the VM, the VM is always accessible by any port and any protocol, despite the fact that its security group denies all ingress traffic. Step-by-step reproduction process: 1) Create a VM in OpenStack 2) Check that there are no rules allowing icmp (for instance) in the security group associated with the VM 3) perform: neutron port-update [any-port-associated-with-the-secgroup] --allowed-address-pairs type=dict list=true ip_address=[a-very-huge-cidr] if your VM uses a private IPv4 address from networks 192.168.x or 172.16.x, then 128.0.0.0/1 will work as "a-very-huge-cidr", if it uses 10.x network then 0.0.0.0/1 should. 4) ping all the VMs in this secgroup successfully (from router namespace, or from any host which is allowed to access floating IPs if floating IP is also assigned to the VM), as well as access it by any port and protocol which the VM is listening. Version: All OpenStack releases up to Mitaka. Perceived severity: It's not a blocker as workaround are pretty obvious, but it's a huge security bug: all the network security provided by Security Groups might be ruined easily, just by updating a single port in neutron. If we restrict the value of allowed-address-pairs in neutron to a single address (/32 or /128), might it break anything? Upstream bug: https://bugs.launchpad.net/neutron/+bug/1622654
2016-11-15 13:49:23 Alexander Ignatov mos/9.x: assignee MOS Neutron (mos-neutron) Ann Taraday (akamyshnikova)
2016-11-15 13:49:30 Alexander Ignatov nominated for series mos/10.0.x
2016-11-15 13:49:30 Alexander Ignatov bug task added mos/10.0.x
2016-11-15 13:49:36 Alexander Ignatov mos/10.0.x: status New Confirmed
2016-11-15 13:49:39 Alexander Ignatov mos/10.0.x: importance Undecided High
2016-11-15 13:49:59 Alexander Ignatov mos/10.0.x: assignee Ann Taraday (akamyshnikova)
2016-11-15 13:50:02 Alexander Ignatov mos/10.0.x: milestone 10.0
2016-11-17 14:28:49 Ann Taraday mos/9.x: status Confirmed In Progress
2016-12-05 12:46:25 Ann Taraday mos/9.x: status In Progress Won't Fix
2016-12-05 12:46:35 Ann Taraday mos/8.0.x: status Confirmed Won't Fix
2016-12-05 12:46:38 Ann Taraday mos/7.0.x: status Confirmed Won't Fix
2016-12-14 10:50:20 Inessa Vasilevskaya mos/10.0.x: assignee Ann Taraday (akamyshnikova) Inessa Vasilevskaya (ivasilevskaya)
2016-12-14 10:50:25 Inessa Vasilevskaya mos: assignee Ann Taraday (akamyshnikova) Inessa Vasilevskaya (ivasilevskaya)
2016-12-26 08:31:48 Inessa Vasilevskaya mos: status In Progress Won't Fix
2017-04-04 13:17:17 Inessa Vasilevskaya mos/10.0.x: status Confirmed Won't Fix