Thursday, 2019-01-24

*** yamamoto has quit IRC00:03
*** hongbin has quit IRC00:22
*** yamamoto has joined #openstack-fwaas02:59
*** irclogbot_1 has quit IRC04:35
*** velizarx has joined #openstack-fwaas08:12
*** yamamoto has quit IRC08:42
*** yamamoto has joined #openstack-fwaas08:54
*** njohnston_ has joined #openstack-fwaas12:03
*** njohnston_ has quit IRC12:05
*** velizarx has quit IRC12:56
*** yamamoto has quit IRC13:09
*** velizarx has joined #openstack-fwaas13:09
*** yamamoto has joined #openstack-fwaas13:40
*** yamamoto has quit IRC14:11
*** yamamoto has joined #openstack-fwaas14:13
*** yamamoto has quit IRC14:13
*** yamamoto has joined #openstack-fwaas14:15
*** yamamoto has quit IRC14:20
*** hongbin has joined #openstack-fwaas14:58
*** velizarx has quit IRC15:00
*** velizarx has joined #openstack-fwaas16:08
openstackgerritMerged openstack/neutron-fwaas master: Define types for C calls in netlink_lib  https://review.openstack.org/63045116:53
*** velizarx has quit IRC17:09
*** yamamoto has joined #openstack-fwaas17:13
openstackgerritMerged openstack/neutron-fwaas master: Change netns tests with oslo.privsep to check netns links  https://review.openstack.org/63165417:14
*** yamamoto has quit IRC17:18
*** hongbin has quit IRC19:20
*** hongbin has joined #openstack-fwaas19:22
*** hongbin has quit IRC19:22
*** hongbin has joined #openstack-fwaas19:25
*** mlavalle has joined #openstack-fwaas19:58
*** yamamoto has joined #openstack-fwaas20:00
mlavallehongbin: hey20:00
hongbinmlavalle: pong20:00
hongbinit looks sridar is not here yet20:00
mlavallelet's give him a few minutes. if he doesn't show up, I'll ping him in whatsapp20:02
hongbinok20:02
mlavallehongbin: you know what whatsapp is, right?20:06
hongbinmlavalle: i know20:06
hongbinalthough my account is not used for a while20:07
mlavallehongbin: US WeChat20:07
hongbinyes20:07
mlavallewithout the payments functionality20:07
hongbinwithout redpack20:07
mlavalleyeap20:08
mlavalleFacebook pais $20 billion for it, though20:08
mlavallepaid^^^20:08
hongbinyes, i heard the news in before20:09
mlavalleand then got in a fight with the founders and they left20:09
mlavalleone of them was so pissed off that he left several billion on the table20:10
mlavalleof course, he can afford it20:10
hongbinlol20:10
* mlavalle pinging Sridar20:11
mlavallehe is not responding in whatsapp either. When he does, I'll ping you here20:17
hongbinok, thanks20:18
*** SridarK has joined #openstack-fwaas20:24
SridarKmlavalle: hongbin hi20:24
SridarKsorry got delayed in a conversation20:25
hongbinSridarK: hi sridar20:25
mlavalleSridarK: hey, nice to see you20:25
hongbinnp20:25
mlavalleso we have one point of discussion about one of the specs, right?20:25
hongbinyes20:26
hongbin#link https://review.openstack.org/#/c/600870/20:26
SridarKyes let me bring that up20:26
SridarKWas there a reason that we need multiple FWG ?20:27
SridarKWe can achieve pretty much the samething with multiple policies20:27
hongbini can explain the reasons20:27
hongbinthe first use case is the anti-virus detection20:27
SridarKpls - again this is only a recommendation20:27
hongbinsure20:28
hongbinso, there is a use case that the cloud provider run anti-virus software to detect some VMs are compromise20:28
SridarKok20:28
hongbinthen, the cloud provider wanted to "block" those compromise VMs20:28
hongbinto achive that, the cloud provider create a FWG, and attach the FWG to the VMs20:29
hongbinthis is the case that can be resolved by multiple FWGs20:30
SridarKagreed20:30
SridarKthe alternate model:20:30
hongbinso, the VMs are created with their own FWG(s), once the VM is detected, the cluod provider add another FWG to the VMs20:30
SridarKsorry go ahead20:30
hongbini basically finished :)20:31
SridarK:-)20:31
SridarKU want to sort of bind a FWG to a VM or set of VM's20:31
hongbinyes, that is one thing i want20:32
SridarKI felt we can achieve the same thing with a policy (set of rules) - so when this VM or a VM from a particular group is plugged into a port - we can add a policy block that has this set of rules20:33
SridarKto the FWG20:33
SridarKit may be easier to set a priority for the evaluation of policies20:34
SridarKirrespective of FWG or policy - we want to filter thru a set of rules20:34
hongbinyes, that is correct20:35
SridarKand the order in which we go thru the rules is important20:35
SridarKor at least deterministic and predictable20:36
hongbinthat is right20:36
hongbinso it sounds like both models (multiple FWG or multiple policies) can achieve the goal20:37
SridarKyes20:37
hongbinthen, the point is which model is easier to use and maintainable20:37
SridarKI think we had some validation to ensure that a port can only belong to one FWG20:38
SridarKfor the reasons above20:38
SridarKThe FWG is really a collection of Rules (in a policy) and a set of Ports20:38
hongbinyes, agree20:39
SridarKIt is policy that actually defines a collection of Rules that we want to filter on20:39
hongbinyes20:39
SridarKAlso if we can support multiple policies - we can achieve another goal20:39
hongbinwhich goal?20:39
SridarKIn a workflow where:20:40
SridarK1) the user defines some rules20:40
SridarK2) the admin wants to enforce some set of rules20:40
SridarKperhaps like Infosec or PCI compliance20:40
SridarKwe can have a policy block that can be applied20:41
SridarKrather easily20:41
SridarKso some of the std stuff can be picked up easily and reused20:41
hongbini assume it can also be achieved in the multiple FWG model?20:41
SridarKSo the multiple policy requirement has been in some thought for some time20:41
SridarKyes we can20:42
hongbinis there any cons if using the multiple FWGs model in your use case?20:42
SridarKTypically in deployment  - we may not have a Firewall installed everytime we need a set of rules to be effected20:43
SridarKAlso it may be good to keep the prioritization across policies within the context of a FWG20:44
SridarKrather than across FWG20:44
hongbinthe reason is?20:44
SridarKIMO, that will be more modular20:44
hongbinok20:45
SridarKu only want to enforce a priority within related blocks of rules20:45
SridarKso it is encapsulated within a FWG20:45
hongbinyes, it might be true20:45
SridarKif we were to do this across FWG - we will need to track the prioritization which would be meaningless if we they are on different ports20:46
SridarKIn some sense we will introduce another grouping of FWG20:46
hongbinok20:47
SridarKIs there a reason that having multiple policies will not work for u ?20:47
hongbini am trying to think whether multiple policies will work for me or not20:48
hongbini don't have an answer yet, but just brainstroming several cases20:48
SridarKAgain i dont fully understand if there are some intricacies in ur scenario that need that20:49
SridarKPerhaps u can give this some thought20:49
hongbinin particular, in our use cases, one of the reason we want to adopt FWaaS API is to make things more managable20:49
hongbinfor example, in a cloud, there are lots of VMs, lots of polices, lots of ports, and FWGs20:49
hongbini am trying to think which model is more managable in such cases20:50
SridarKok20:50
hongbinthen, go back to the anti-virus cases20:50
hongbinif a VM is compromise, we block this VM20:51
SridarKSometimes i have felt even the notion of FWG is a bit redundant - but it kind of provides a grouping20:51
hongbinthe first model is to add a policy to the existing FWG of the VM20:51
hongbinthe second model is to add another FWG to the VM20:51
SridarKit in itself is only a collection of policy and ports20:52
hongbinyes, i agree with that point20:52
SridarKif the port is all distinct - u can always have separate FWG20:52
SridarKthe problem is when u have multiple FWG on a port20:52
SridarKeven if it is distinct, look at this workflow:20:53
SridarK1) u a VM with a FWG (with some set of rules in a policy)20:53
SridarK2) when u add a VM (which is from the same group as (1) with similar filtering requirements:20:54
SridarKa) u plug the VM20:54
SridarKb) u add the port u are plugging the VM into to the existing FWG20:54
SridarKpls take that with a caveat w.r.t default FWG20:55
SridarKbut that basic idea20:55
SridarKso u will have lesser number of FWGs to manage20:55
SridarKas long as u have the right set of ports in the FWG20:55
SridarKjust a thought20:56
SridarKagain this is an oversimplification possibl20:56
SridarKy20:56
* hongbin is digesting the context20:57
SridarK:-)20:57
hongbincould you give an example?20:58
hongbin(so that i can follow it better)20:58
SridarKIf u have VM1 on Port 1 with some set of Rules in a policy P120:59
hongbinright20:59
SridarKthen the FWG would be: FWG1: P1, Port 120:59
hongbinyes20:59
SridarKNow if u add another VM VM2 on Port2 with the same set of Rules:21:00
SridarKThen u can just update FWG1 to be:21:00
SridarKFWG1: P1, (Port1, Port2)21:00
SridarKso u only have one FWG21:01
SridarKfor both VMs21:01
hongbinthat is right21:01
hongbinthat is the simple scenario21:01
SridarKNow if the admin wants some infosec rules21:02
SridarKto be on all ports21:02
SridarKwhich is perhaps admin owned21:02
hongbinok21:02
SridarKthen we can have:21:02
SridarKFWG1: PolicyINFOSEC, P1, (Port1, Port2)21:03
SridarKand we can force the ordering across the policies21:03
SridarKPolicyINFOSEC before P121:03
SridarKor can be controlled by configuration21:03
hongbinok21:03
SridarKNow the ordering is within the context of FWG121:04
hongbinyes21:04
SridarKLets say u bring up some other VM21:04
SridarKnot related to VM1 and VM2 with different filtering requiremnts21:04
SridarKVM 3 brought up on Port321:05
hongbinright21:05
SridarKFWG2: PolicyINFOSEC, P2, (Port3)21:05
SridarKFWG1 is on Port1 and Port221:06
hongbinright21:06
SridarKFWG is on Port321:06
SridarK*FWG2 is on Port321:06
hongbinso, let's say later, we have another VM21:06
hongbinVM4 that has P421:07
SridarKhongbin: sorry i will need to run out in abt 5 mins - just quick timecheck21:07
SridarKok21:07
SridarKIf VM4 has policy P4 and is obviously on a different port21:08
hongbinVM4 needs to have P2 and PolicyINFOSEC21:08
SridarKah ok21:08
SridarKthen if u have it on Port 421:08
hongbinthen, we need to create another FWG?21:08
SridarKthen u can add Port 4 to FWG221:08
SridarKno need for another FWG21:09
hongbinok21:09
hongbinthen, let's said VM4 needs to have P1, P2, and PolicyINFOSEC21:09
hongbinthen you need another FWG21:09
SridarKfor all VM's with a common set of rules (contained in Policy) we can use the same FWG21:10
SridarKyes if VM4 needs a different set of rules21:10
hongbinso, we create P3, which is P1 + P2?21:10
hongbinthen VM4 will be21:11
hongbinFWG3: PolicyINFOSEC, P3, (Port4)21:11
hongbincorrect?21:11
SridarKyes or  u can also just have it as:21:11
SridarKFWG3: PolicyINFOSEC, P1, P2, (Port 4)21:12
hongbinright21:12
SridarKif we can reuse policies21:12
SridarKless resources on OpenStack21:12
hongbinthen, if there are lots of VMs21:12
hongbinwe will end up creating lots of FWGs21:13
hongbineach FWG will have different permutation of policies21:13
SridarKNot if the VM's are using same set of rules21:13
hongbinyes21:13
SridarKu will just a port association21:13
hongbinhowever, VMs rules are changing at runtime , right?21:14
hongbin(for example, a VM is compromised)21:14
SridarKand managing the ordering across Rule blocks21:14
SridarKwell if u change a rule in a policy21:14
hongbinthat is no ideal, i can explain why21:14
hongbinif i change rule in policy, all VMs are affected21:15
SridarKI really have to run to an appt21:15
hongbinif there are lots of VMs using the same rule, changing a rule is not managable21:15
SridarKbut lets wrap this21:15
hongbinsure21:15
hongbincould we continue the discussion using email?21:15
SridarKyes we can21:16
hongbinor want to schedule another meeting?21:16
SridarKwhat timezone are u in ?21:16
hongbintoronto21:16
mlavallehe is west coast + 321:16
SridarKso it 4:15pm ?21:16
mlavalleI'm west coast + 221:16
hongbinright21:16
mlavalleyes21:16
SridarKshall we continue tomorrow ?21:16
hongbinsure21:16
mlavallefine with me21:16
SridarKor email is fine too21:16
mlavallelet's give it a try tomorrow21:17
SridarKor i can set up a webex too21:17
mlavallethat works21:17
mlavallewhat time are you available tomorrow?21:17
SridarKi am fairly open - let me email21:17
SridarKi have to run out21:17
SridarKvery late21:17
hongbini am not sure about webex, not sure if it will be allowed by my company firewall21:17
SridarKsorry abt that21:17
SridarKoh ok21:18
SridarKwill send an email on time for tomorrow21:18
SridarKrunning out talk later21:18
SridarKthx hongbin mlavalle21:18
hongbinok, see you later21:18
mlavalleSridarK: thank you21:18
hongbinSridarK: thanks for your time21:18
SridarKnp bye all21:18
hongbinbye21:20
mlavallegood discussion hongbin. Thanks21:20
hongbinmlavalle: i will try to summary what we discussed today, then the next time, we started from there21:21
hongbinmlavalle: thanks for making this meeting happen21:21
mlavallethat's a god idea21:21
mlavallegood^^^21:21
hongbin:)21:21
*** mlavalle has left #openstack-fwaas21:42
*** hongbin has quit IRC22:54

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!