[openstack-dev] [neutron] - Changing the Neutron default security group rules
Fox, Kevin M
Kevin.Fox at pnnl.gov
Wed Mar 2 22:40:11 UTC 2016
Yeah, we've changed the default so that at very least you can ssh to the vm.
If all you provide is a completely locked or a completely open sg, users will choose the completely open one every time. :/
Putting a few common cases might go a long way to keep things more secure by default.
Thanks,
Kevin
________________________________________
From: Jeremy Stanley [fungi at yuggoth.org]
Sent: Wednesday, March 02, 2016 1:12 PM
To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [neutron] - Changing the Neutron default security group rules
On 2016-03-03 07:49:03 +1300 (+1300), Xav Paice wrote:
[...]
> In my mind, the default security group is there so that as people
> are developing their security policy they can at least start with
> a default that offers a small amount of protection.
Well, not a small amount of protection. The instances boot
completely unreachable from the global Internet, so this is pretty
significant protection if you consider the most secure system is one
which isn't connected to anything. Unfortunately this is not, I
think, what most users want as an end state for most of their
instances. I simply wonder if there's a default which can be useful
to at least some majority, rather than having to make things equally
complex for everyone. Hard to identify, rife with opinion, and not a
solution I'm holding my breath for... but probably still more
attainable than world peace.
> Disabling that protection means I'd have to be dealing with a vast
> number of customers with instances that have been compromised
> because they didn't add to the security groups.
Sure, and that's I think how we've arrived at the default
indecision. It's easier to tell customers that they have to adjust
their firewall rules before they can do anything at all (and risk
some of them going elsewhere for an easier out-of-the-box
experience), than to bear the liability and reputation loss from
customers getting compromised because they assumed wrongly that they
shouldn't have to secure their systems "in the cloud." That said,
there _are_ providers whose default behavior is to not filter you.
In IRC I tried to draw comparisons to colocation, where my default
expectation is a routed network I can put my servers on with no risk
that the provider is surreptitiously blocking my traffic. If I want
packet filtering, I can bring a firewall into the colo and plug it
in, then configure it to my liking, but the default bare-bones
experience is a _less_ complex one (no firewall appliance) and if I
want separate filtering that's additional complexity I opt into by
choice.
--
Jeremy Stanley
__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: OpenStack-dev-request at lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
More information about the OpenStack-dev
mailing list