Tuesday, 2015-12-15

*** openstack has joined #openstack-zephyr04:26
red|kiwilooks like we got the bots approved, good work kitsuneninetails :)04:43
red|kiwiAlso, this channel is now logged to http://eavesdrop.openstack.org/irclogs/%23openstack-zephyr/ - might want to add that to the topic, kitsuneninetails04:45
*** hiroyuki-i has quit IRC05:00
*** hiroyuki-i has joined #openstack-zephyr05:34
*** hiroyuki-i has quit IRC05:40
*** hiroyuki-i has joined #openstack-zephyr06:00
*** ChanServ changes topic to ""Discussion on Zephyr "noauth" Neutron Testing Framework (https://launchpad.net/zephyr-neutron). This channel is logged to: http://eavesdrop.openstack.org/irclogs/%23openstack-zephyr/""06:54
*** ChanServ changes topic to "Discussion on Zephyr "noauth" Neutron Testing Framework (https://launchpad.net/zephyr-neutron). This channel is logged to: http://eavesdrop.openstack.org/irclogs/%23openstack-zephyr/"06:55
kitsuneninetailshttps://review.gerrithub.io/#/c/255416/ for the spoofing test additions06:56
kitsuneninetailsitsuugo: ^^06:57
itsuugoI think that the icmp echo to the spoofed ip should be discarded and don't have to reach the vm06:59
kitsuneninetailsThe anti-spoofing only looks at source IP, so the echo request has a valid packet, doesn't it?07:27
kitsuneninetailsIt's the response that has an invalid source IP07:27
kitsuneninetailsSo, the request should reach the destination and the reply get dropped.07:31
kitsuneninetailsBut either way, the round trip will fail, which is what is being tested (I already test single-way in the other tests).07:31
*** ChanServ changes topic to "Discussion on Zephyr "noauth" Neutron Testing Framework (https://launchpad.net/zephyr-neutron) | channel logs: http://eavesdrop.openstack.org/irclogs/%23openstack-zephyr/"07:32
*** ryu25 has joined #openstack-zephyr07:47
itsuugoI guess that the only traffic permitted to an instance is the one that match the mac and the ip of the neutron ports in both directions,08:20
itsuugoI don't see the point to receive traffic that is not intended to you08:20
itsuugoyou can sniff traffic in that way08:20
itsuugoIMHO is a security hole if you don't discard the traffic not related to the neutorn ip/mac pair in both directions08:21
kitsuneninetailsWell08:32
kitsuneninetailsIt's not my design :)08:32
kitsuneninetailsI'm just testing it08:32
kitsuneninetailsBut the design is very specifically set to look at source_ip.  That much I know08:33
kitsuneninetailsBut I kind of disagree with your assessment08:33
kitsuneninetailsHow would I know which dest IPs are valid and which are not?08:33
kitsuneninetailsIf I want to ping 8.8.8.8, how does the network know that's an invalid IP?08:33
kitsuneninetailsor valid?08:33
kitsuneninetailsTo set up an allowed address pair for every IP a VM might or might not access would be cumbersome IMHO, and too rigid.  That's what security groups are for.08:34
kitsuneninetailsAnd for the receiving VM, it would only ever accept packets that have a dest_ip matching an address on the interface, so that should be safe08:35
*** red|trela has joined #openstack-zephyr08:58
*** hiroyuki-i has quit IRC08:58
*** hiroyuki-i has joined #openstack-zephyr09:10
ryu25indeed the current implementation of spoofing in midonet only deals with traffic originating from the VM (protecting the other VMs in the network).09:33
ryu25it's an interesting point, and I think the definitive answer will come from the reference implemetnation09:33
ryu25I cannot answer this from top of head, but I'm sure it's easy to find out09:35
yamamotois there anything preventing zephyr from moving to stackforge?09:45
kitsuneninetailsI don't think so10:14
kitsuneninetailsjust my time and following the process10:15
itsuugokitsuneninetails ryu25 sorry for the late response, I meant that the anti spoofing rules should permit only the traffic originated from the vm  and destinated to the vm11:01
itsuugoin inbound you filter by dst mac and dst ip11:01
itsuugoand in outbound by src mac and src ip11:02
itsuugootherwise is easy to arpspoof11:02
itsuugobecause you can generate fake GARP11:02
yamamotoitsuugo: midonet doesn't have arp spoof protection?11:32
yamamotokitsuneninetails: may i help the process?  it isn't difficult.  you might need to resubmit unmerged reviews but that's all.11:34
*** hiroyuki-i has quit IRC11:36
*** yamamoto has quit IRC11:42
itsuugoI guess that the only arp spoof protection are the antispoofing rules that are used for outbound traffic11:42
itsuugobut I guess we need rules in inbound too11:42
itsuugoBTW there is an issue with this https://midobugs.atlassian.net/browse/MI-28511:43
*** yamamoto has joined #openstack-zephyr11:44
*** yamamoto has quit IRC11:51
*** yamamoto has joined #openstack-zephyr11:51
*** yamamoto has quit IRC12:14
*** yamamoto has joined #openstack-zephyr12:54
*** yamamoto has quit IRC13:41
*** yamamoto has joined #openstack-zephyr13:56
*** ryu25 has quit IRC14:30
*** red|trela has quit IRC15:42
*** yamamoto has quit IRC16:25
*** yamamoto has joined #openstack-zephyr16:26
*** red|kiwi has quit IRC16:33
*** yamamoto has quit IRC16:39

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!