[openstack-dev] [Quantum] Spec of Security Group implementation

Nachi Ueno nachi at nttmcl.com
Thu Nov 29 01:38:45 UTC 2012


Thanks

 Ok I got the spec.

Let's discuss underlaying filtering rule layer in next patch.

2012年11月28日水曜日 Dan Wendlandt dan at nicira.com:

>
>
> On Wed, Nov 28, 2012 at 4:06 AM, Akihiro MOTOKI <motoki at da.jp.nec.com>wrote:
>
>  Hi Nachi,
>
> I will check and test your new patch.
> As I raised these issues, I commented inline. There is no confliciton with
> Dan's comment.
>
>
> (2012/11/28 10:39), Nachi Ueno wrote:
>
> Hi Dan
>
>  Thank you for your reply
>
>
> 2012/11/27 Dan Wendlandt <dan at nicira.com>
>
>
>
>  On Tue, Nov 27, 2012 at 2:34 PM, Nachi Ueno <nachi at nttmcl.com> wrote:
>
> Hi Aaron, Akihiro, Gary
>
>  I would like to ask your opinion about the security group specs.
>
>  [Discussion 1]  security group rule applied for port for network:* ports?
>
>  - Dhcp port (looks not needed)
>
>
>  I don't see obvious use cases here, and a tenant could definitely shoot
> themselves in the foot by configuring security groups here.  Not supporting
> them here would make sense.
>
>   I totally with Dan.  I don't see any useful usecases either.
>
>
>     - Router port ( I could see many usecases, but this may be
> implemented as a service extension such as VPM)
>
>
>  This is tricky.  It make sense to do packet filtering at router ports,
> but I would argue that security groups are the wrong abstraction here.
>  Security groups are very directional, as their original intent was to
> project an "inside" VM from the "outside" world.   That directionality
> doesn't really make sense on router port in my experience.
>
>     My understanding is similar to Dan.
> I see security groups are basically applied to network endpoints such as
> VIF of VM.
> Router is not an network endpoint and the meaning of 'direction' is turned
> for a router port.
> It is better packet filtering at router is supported by other scheme than
> security groups.
>
>
>
>
>
>  IMO, if we take this limitation, these limitation should be done in
> securitygroups_db class.
>
>
>  seems reasonable.
>
>   yes, I think we all agree there.
>
> dan
>
>
>>
>> Ideally some underlying layer of security group seems a better place to
>> implement such logic
>> and securitygroups_db class should dedicate itself to manage security
>> group and its rule.
>> It makes it easier to manage provider specific rules I think.
>>
>>
>>
>> Thanks,
>> Akihiro
>>
>>
>>
>>
>>>
>>>  Dan
>>>
>>>
>>>
>>>
>>>>    Thanks
>>>>  Nachi
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> OpenStack-dev mailing list
>>>> OpenStack-dev at lists.openstack.org <javascript:_e({}, 'cvml',
>>>> 'OpenStack-dev at lists.openstack.org');>
>>>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
>>>>
>>>>
>>>
>>>
>>>  --
>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>> Dan Wendlandt
>>> Nicira, Inc: www.nicira.com
>>> twitter: danwendlandt
>>> ~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>
>>> _______________________________________________
>>> OpenStack-dev mailing list
>>> OpenStack-dev at lists.openstack.org <javascript:_e({}, 'cvml',
>>> 'OpenStack-dev at lists.openstack.org');>
>>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
>>>
>>>
>>
>>
>> _______________________________________________
>> OpenStack-dev mailing listOpenStack-dev at lists.openstack.org <javascript:_e({}, 'cvml', 'OpenStack-dev at lists.openstack.org');>http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
>>
>>
>>



>
>> _______________________________________________
>> OpenStack-dev mailing list
>> OpenStack-dev at lists.openstack.org <javascript:_e({}, 'cvml',
>> 'OpenStack-dev at lists.openstack.org');>
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
>>
>>
>
>
> --
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Dan Wendlandt
> Nicira, Inc: www.nicira.com
> twitter: danwendlandt
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-dev/attachments/20121128/fc5bbc1d/attachment.html>


More information about the OpenStack-dev mailing list