Security Group doesn't work if the specific allowed-address-pairs value is set
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
Invalid
|
Medium
|
Ann Taraday |
Bug Description
Summary:
Security Group doesn't work if the specific allowed-
High level description:
OpenStack user is allowed to specify arbitrary mac_address/
Step-by-step reproduction process:
1) Create a VM in OpenStack
2) Check that there are no rules allowing icmp (for instance) in the security group associated with the VM
3) perform:
neutron port-update [any-port-
if your VM uses a private IPv4 address from networks 192.168.x or 172.16.x, then 128.0.0.0/1 will work as "a-very-huge-cidr", if it uses 10.x network then 0.0.0.0/1 should.
4) ping all the VMs in this secgroup successfully (from router namespace, or from any host which is allowed to access floating IPs if floating IP is also assigned to the VM), as well as access it by any port and protocol which the VM is listening.
Version:
All OpenStack releases up to Mitaka.
Perceived severity:
It's not a blocker as workaround are pretty obvious, but it's a huge security bug: all the network security provided by Security Groups might be ruined easily, just by updating a single port in neutron.
If we restrict the value of allowed-
Changed in neutron: | |
status: | New → Confirmed |
Don't mark it as confirmed please, allow the bug liaison to triage - I think they use the New status to filter bugs