Activity log for bug #1749667

Date Who What changed Old value New value Message
2018-02-15 09:52:58 Ian Kumlien bug added bug
2018-02-15 17:52:49 Brian Haley neutron: status New Confirmed
2018-02-15 17:53:15 Brian Haley neutron: importance Undecided Critical
2018-02-15 17:53:20 Brian Haley neutron: assignee Brian Haley (brian-haley)
2018-02-15 17:55:40 Brian Haley bug added subscriber Brian Haley
2018-02-15 19:01:29 OpenStack Infra neutron: status Confirmed In Progress
2018-03-02 14:39:09 Thomas Morin bug added subscriber Thomas Morin
2018-03-07 20:57:13 OpenStack Infra neutron: status In Progress Fix Released
2018-05-10 21:48:52 OpenStack Infra tags in-stable-queens
2018-05-21 03:58:04 OpenStack Infra tags in-stable-queens in-stable-pike in-stable-queens
2018-11-27 13:03:37 Edward Hope-Morley bug task added cloud-archive
2018-11-27 13:03:45 Edward Hope-Morley nominated for series cloud-archive/ocata
2018-11-27 13:03:51 Edward Hope-Morley cloud-archive: status New Fix Released
2018-11-27 14:18:29 Edward Hope-Morley description We have had problems with openvswitch agent continuously restarting and never actually completing setup because of this: # Completed by iptables_manager ; Stdout: ; Stderr: iptables-restore v1.4.21: multiport only works with TCP, UDP, UDPLITE, SCTP and DCCP Error occurred at line: 83 Try `iptables-restore -h' or 'iptables-restore --help' for more information. 83. -I neutron-openvswi-<id> 69 -s <ip> -p 112 -m multiport --dports 1:65535 -j RETURN --- Someone has managed to inject a rule that is, effectively, a DoS. [Impact] Neutron allowed users to create security group rules that would translate to invalid iptables rules thus causing neutron to fail when it attempted to apply them. This is now fixed for >= Pike and we are backporting for Ocata. [Test Case] * deploy openstack ocata * create an invalid security group rule e.g. openstack security group rule create --protocol gre --dst-port 0:255 jmclane * check that request is rejected with e.g. Error while executing command: BadRequestException: Unknown error, {"NeutronError": {"message": "Invalid protocol 47 for port range, only supported for TCP, UDP, UDPLITE│········································································································· , SCTP and DCCP.", "type": "SecurityGroupInvalidProtocolForPortRange", "detail": ""}} [Regression Potential] Upgrading to this patch will reject new api requests that try to create invalid rules but will not cleanup invalid rules already extant. ----------------------------------------------------------------------------- We have had problems with openvswitch agent continuously restarting and never actually completing setup because of this: # Completed by iptables_manager ; Stdout: ; Stderr: iptables-restore v1.4.21: multiport only works with TCP, UDP, UDPLITE, SCTP and DCCP Error occurred at line: 83 Try `iptables-restore -h' or 'iptables-restore --help' for more information.     83. -I neutron-openvswi-<id> 69 -s <ip> -p 112 -m multiport --dports 1:65535 -j RETURN --- Someone has managed to inject a rule that is, effectively, a DoS.
2018-11-27 14:18:43 Edward Hope-Morley summary neutron doesn't correctly handle unknown protocols and should whitelist known and handled protocols [SRU] neutron doesn't correctly handle unknown protocols and should whitelist known and handled protocols
2018-11-27 14:18:59 Edward Hope-Morley tags in-stable-pike in-stable-queens in-stable-pike in-stable-queens sts sts-sru-needed
2018-11-27 14:19:37 Edward Hope-Morley attachment added lp1749667-xenial-ocata.debdiff https://bugs.launchpad.net/cloud-archive/+bug/1749667/+attachment/5216782/+files/lp1749667-xenial-ocata.debdiff
2018-11-27 18:29:17 Corey Bryant bug task added cloud-archive/ocata
2018-11-27 18:32:45 Corey Bryant cloud-archive/ocata: status New Triaged
2018-11-27 18:32:51 Corey Bryant cloud-archive/ocata: importance Undecided Critical
2018-11-27 18:39:13 Corey Bryant description [Impact] Neutron allowed users to create security group rules that would translate to invalid iptables rules thus causing neutron to fail when it attempted to apply them. This is now fixed for >= Pike and we are backporting for Ocata. [Test Case] * deploy openstack ocata * create an invalid security group rule e.g. openstack security group rule create --protocol gre --dst-port 0:255 jmclane * check that request is rejected with e.g. Error while executing command: BadRequestException: Unknown error, {"NeutronError": {"message": "Invalid protocol 47 for port range, only supported for TCP, UDP, UDPLITE│········································································································· , SCTP and DCCP.", "type": "SecurityGroupInvalidProtocolForPortRange", "detail": ""}} [Regression Potential] Upgrading to this patch will reject new api requests that try to create invalid rules but will not cleanup invalid rules already extant. ----------------------------------------------------------------------------- We have had problems with openvswitch agent continuously restarting and never actually completing setup because of this: # Completed by iptables_manager ; Stdout: ; Stderr: iptables-restore v1.4.21: multiport only works with TCP, UDP, UDPLITE, SCTP and DCCP Error occurred at line: 83 Try `iptables-restore -h' or 'iptables-restore --help' for more information.     83. -I neutron-openvswi-<id> 69 -s <ip> -p 112 -m multiport --dports 1:65535 -j RETURN --- Someone has managed to inject a rule that is, effectively, a DoS. [Impact] Neutron allowed users to create security group rules that would translate to invalid iptables rules thus causing neutron to fail when it attempted to apply them. This is now fixed for >= Pike and we are backporting for Ocata. [Test Case]   * deploy openstack ocata   * create an invalid security group rule e.g. openstack security group rule create --protocol gre --dst-port 0:255 jmclane   * check that request is rejected with e.g. Error while executing command: BadRequestException: Unknown error, {"NeutronError": {"message": "Invalid protocol 47 for port range, only supported for TCP, UDP, UDPLITE│········································································································· , SCTP and DCCP.", "type": "SecurityGroupInvalidProtocolForPortRange", "detail": ""}} [Regression Potential] Upgrading to this patch will reject new api requests that try to create invalid rules but will not cleanup invalid rules already extant. Note also that the backported ocata patch is unchanged from pike. ----------------------------------------------------------------------------- We have had problems with openvswitch agent continuously restarting and never actually completing setup because of this: # Completed by iptables_manager ; Stdout: ; Stderr: iptables-restore v1.4.21: multiport only works with TCP, UDP, UDPLITE, SCTP and DCCP Error occurred at line: 83 Try `iptables-restore -h' or 'iptables-restore --help' for more information.     83. -I neutron-openvswi-<id> 69 -s <ip> -p 112 -m multiport --dports 1:65535 -j RETURN --- Someone has managed to inject a rule that is, effectively, a DoS.
2018-11-28 02:14:30 Corey Bryant cloud-archive/ocata: status Triaged Fix Committed
2018-11-28 02:14:32 Corey Bryant tags in-stable-pike in-stable-queens sts sts-sru-needed in-stable-pike in-stable-queens sts sts-sru-needed verification-ocata-needed
2018-11-30 18:30:31 Edward Hope-Morley tags in-stable-pike in-stable-queens sts sts-sru-needed verification-ocata-needed in-stable-pike in-stable-queens sts sts-sru-needed verification-ocata-done
2018-12-05 13:37:57 Corey Bryant cloud-archive/ocata: status Fix Committed Fix Released