[Openstack-security] [stackforge/networking-ovs-dpdk] SecurityImpact review request change I82426b8d5951d2c96e72e42818bfae90b8301076
gerrit2 at review.openstack.org
gerrit2 at review.openstack.org
Tue Apr 28 16:10:43 UTC 2015
Hi, I'd like you to take a look at this patch for potential
SecurityImpact.
https://review.openstack.org/178268
Log:
commit 122e7d436d2baf4286f78c0165fcd6601b6e615e
Author: Sean Mooney <sean.k.mooney at intel.com>
Date: Tue Apr 28 15:48:02 2015 +0000
reopening master for liberty
- updated test-requirments.txt to master
- backported neuton agent changes from master.
Squashed commit of the following:
commit 268f1c5a84ba8fe9ddb453f7c3b13ae6a8f50127
Merge: 79e9ffc a46f609
Author: Jenkins <jenkins at review.openstack.org>
Date: Wed Apr 22 20:37:51 2015 +0000
Merge "ovs_neutron_agent: Remove a redundant assignment of ovs_status"
commit 79e9ffc9a423faab05ffdf060d77abaaa44ce19b
Merge: f24d1c8 75c1d6f
Author: Jenkins <jenkins at review.openstack.org>
Date: Wed Apr 15 00:36:38 2015 +0000
Merge "Enable ARP spoofing prevention by default"
commit f24d1c844c4095db9422357453b35251f6125c6a
Merge: 7212258 eabd40a
Author: Jenkins <jenkins at review.openstack.org>
Date: Mon Apr 13 20:09:06 2015 +0000
Merge "Move values for network_type to plugins.common.constants.py"
commit eabd40a8cd20b7189a31c301e5f19703604095d3
Author: Romil Gupta <romilg at hp.com>
Date: Mon Mar 23 08:05:41 2015 -0700
Move values for network_type to plugins.common.constants.py
It is quite confusing to have values for network type in common.constants.py
instead of having in plugins.common.constants.py.
Currently, the plugins/common/constants.py consists network_type constants
like VLAN, VXLAN, GRE etc. but values for network type like ranges
are defined in common.constants.py which is not good, it is better to have
both things at the same place.
This patch set addresses the same.
Moved out few methods which are predominantly used in plugins
from common.utils.py to plugins.common.utils.py.
Removed constants which were used in neutron-fwaas from
plugins.common.constants.py: https://review.openstack.org/#/c/168709/
Closes-Bug: #1441043
Change-Id: Iecfb15c541ed5d3cce95ba48f072af7fa60ac6f1
commit 7212258a0fdb4e6c41b816dc433e65f49bd37f1d
Merge: 3564b55 088fe8b
Author: Jenkins <jenkins at review.openstack.org>
Date: Thu Apr 9 01:21:53 2015 +0000
Merge "Add simple ARP spoofing protection"
commit a46f609127d64a158a62588b83eb82c1d0f1a5aa
Author: YAMAMOTO Takashi <yamamoto at valinux.co.jp>
Date: Thu Apr 2 13:57:52 2015 +0900
ovs_neutron_agent: Remove a redundant assignment of ovs_status
Change-Id: I8ed572aa48ccc226137f65514c58ca5c3ba77870
commit 75c1d6fa89e0d06c6821ebd998cd66a606fa77d6
Author: Kevin Benton <blak111 at gmail.com>
Date: Sun Apr 12 14:14:38 2015 -0700
Enable ARP spoofing prevention by default
Turn on the ARP spoofing prevention added in
I7c079b779245a0af6bc793564fa8a560e4226afe by
default. It was disabled by default since it
was going into Kilo at the last minute and we
didn't want to risk shipping with a default
that might have broken an edge case that we
didn't consider.
This patch enables it by default since there
shouldn't be any need to have it disabled.
Change-Id: Id17939914ebf8292dce76ccb7d0f6486c91f49e5
commit 088fe8bf381875525ce1c41f482ce74fa989d786
Author: Kevin Benton <blak111 at gmail.com>
Date: Sun Mar 29 03:37:25 2015 -0700
Add simple ARP spoofing protection
Adds an option to setup OVS rules that will prevent
ports attached to the agent from sending any ARP responses
that contain an IP address not belonging to the port
(in fixed IPs or allowed_address_pairs).
It is disabled by default and requires an OVS version that
can match on ARP fields. If it is too old, traffic will
still flow but it won't have ARP spoofing protection.
There is a sanity check to verify that ARP header matching
is supported.
This prevention is specific to OVS so it will not help with
other plugins that use the reference iptables filtering. A
non-OVS-specific general approach will require something like
the ebtables integration in Ibc6d3d520c1383cf7e00f4bdeb7853a41ac4b14b.
Details:
A new table is added for ARP spoofing prevention. All ARP traffic
on the local switching table is sent to this spoofing table.
The spoofing table will allow all ARP requests because we aren't
interested in them. It will then install an ARP response allow rule
for each IP address the port is assigned. All other ARP responses are
dropped.
DocImpact
SecurityImpact
Partial-Bug: #1274034
Change-Id: I7c079b779245a0af6bc793564fa8a560e4226afe
Change-Id: I82426b8d5951d2c96e72e42818bfae90b8301076
More information about the Openstack-security
mailing list