22:05:05 #startmeeting neutron_drivers 22:05:07 Meeting started Thu Jul 13 22:05:05 2017 UTC and is due to finish in 60 minutes. The chair is armax. Information about MeetBot at http://wiki.debian.org/MeetBot. 22:05:08 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 22:05:11 The meeting name has been set to 'neutron_drivers' 22:05:49 let’s go over the list of triaged RFEs 22:05:52 #link https://bugs.launchpad.net/neutron/+bugs?field.status%3Alist=Triaged&field.tag=rfe 22:06:34 we discussed bug #1667877 last week 22:06:35 bug 1667877 in neutron "[RFE] Allow DVR for E/W while leaving N/S centralized" [Wishlist,Triaged] https://launchpad.net/bugs/1667877 22:06:36 there’s a new comment 22:06:45 from Swami 22:07:29 replied 22:07:40 but irrc balls was in kevinbenton’s court 22:07:48 to go approve the RFE and sprinkle his magic 22:07:51 kevinbenton? 22:08:12 same for bug #1669630 22:08:13 bug 1669630 in neutron "Network RBAC acceptance workflow" [Wishlist,Triaged] https://launchpad.net/bugs/1669630 22:08:21 but no action since last week 22:08:42 let’s look at a new one 22:08:43 bug 1672852 22:08:44 bug 1672852 in neutron "[RFE] Make controllers with different list of supported API extensions to behave identically" [Wishlist,Triaged] https://launchpad.net/bugs/1672852 22:08:50 Slow! 22:08:52 dear to ihrachys…no longer 22:08:56 oh sorry 22:09:03 kevinbenton: you have the floor 22:09:28 * armax goes and buys a decent LTE plan for kevinbenton 22:09:45 Ok. Proceee 22:09:55 d 22:09:58 I thought I needed to say something 22:10:15 oh boy 22:10:17 yeah, it helps to show who's the boss 22:10:42 When you said ball was in my court 22:10:43 kevinbenton: OK 22:10:50 bug #1672852 22:10:51 bug 1672852 in neutron "[RFE] Make controllers with different list of supported API extensions to behave identically" [Wishlist,Triaged] https://launchpad.net/bugs/1672852 22:10:52 I was reading spec to see what I needed to do 22:11:08 this RFE, I suggest to scrap and get back to idea in 6 cycles or so 22:11:09 ihrachys’s suggestion is to make this ‘postponed' 22:11:45 ihrachys: yeah but what does this mean for the overall rolling upgrade strategy for neutron? 22:11:51 ihrachys: is that stalled as well? 22:11:56 +1 for defer 22:12:00 it means that we will get there a tad later 22:12:17 this RFE is instrumental to make that happen without side-effects 22:12:26 drop the hyphen between side and effects 22:12:28 no, we work on database layer and stuff; just api may behave a tad different during rolling upgrade; that can be mitigated by sticky lb and such 22:12:28 no? 22:12:58 OK 22:13:15 ihrachys: mind you perhaps make that recommendation and mark it rfe-postponed? 22:13:31 ok 22:13:35 danke 22:13:38 next one 22:13:42 bug #1682247 22:13:43 bug 1682247 in neutron "Neutron should be able to fetch hostkeys for ports" [Wishlist,Triaged] https://launchpad.net/bugs/1682247 22:14:10 have we resolved the concern around why it's neutron and not nova? 22:14:14 I think we spec stalled, but I think there’s a good consensus that this stuff does make sense and we want to do that in neutron-land 22:14:16 mordred: ^ 22:14:24 ihrachys: yes, 22:14:41 ihrachys: I think there were a number of comments on the initial draft for the spec 22:15:03 is it about different finger per port? 22:15:15 in multiport vm 22:15:19 and so long as we don’t make neutron bloat into a certificate authority this is enough of an enhancement that makes certain security attacks a thing of the past 22:15:31 I remember they were discussing in infra 22:15:49 ihrachys: it shouldn’t be IMO, but that’s a detail for the spec 22:15:56 And there was still question about whether there should be a more general way to get info to API 22:15:59 did modred respond to your question, kevinbenton? 22:15:59 From instance 22:16:29 Not yet 22:17:02 so I say let's hold on this one until we hear back from modred 22:17:15 so kevinbenton this one is to be approved, assumed we have mordred respinning the spec and potentially prototyping the neutron code? 22:17:22 mlavalle: ok 22:17:45 I guess we can agree the use case and the proposal makes sense 22:17:49 ? 22:17:52 I do 22:17:55 I think kevinbenton may have actually convinced me that thereis a viable alternative 22:18:06 but I do still want to respin/update it 22:18:21 mordred: do share! 22:18:26 I also owe a blog post/write up of the summary of the kevinbenton discussion 22:19:06 mordred: what alternative are you referring to, if you can summarize it in a few words 22:19:07 ? 22:19:07 armax: it would take too long to do in irc - I'll write it up and post it and then ping you - it took us AGES to get all theway to the meat of th eissue 22:20:21 hrm. I can _try_ real quick - tl;dr is that as long as you don't expose secrets over the connection, an initial key-based (and only key-based) connection can be foud to be safe... 22:20:23 mordred: OK, but was the alternative suggesting that this be done outside neutron? 22:20:40 if you can verify content on the host that would also identify the host as being the correct host and not a mitm honeypot 22:21:12 mordred: I suppose that would potentially lead to a more convoluted user experience? 22:21:14 with a config-drive attached to a vm, you could, with a single command that does not send secrets over the wire, verify that content you expect to be on the host is, in fact, on the host - and therefore that the host is not a honeypot 22:21:17 yes 22:21:19 or at least with more steps involved? 22:21:25 it's a thing you have to do precisely correctly 22:21:43 BUT - it _is_ possible to do precisely correctly and have confidence 22:21:56 so I still think we should have the other thing- bcause many cloud users would like help with stuff 22:22:14 and the more help we can give them on topics where they're more than likely otherwise to get stuff wrong the better 22:22:16 I see 22:22:32 but the spec needs a respin - sorry I haven't followed up with it 22:22:40 I suppose it’s an alternative, but probably not as viable :) 22:23:11 in the sense that is a lot more labor intensive in the number of steps required on the user to ascertain that the host is not indeed a bogus one 22:23:13 ? 22:23:58 yah 22:24:16 and there's a bunch of "this only works in these exact conditions" 22:24:16 I think this might be my initial though when thinking to have this done in nova itself, either way you could potentially capture this in the alternatives section in the spec 22:24:25 ++ 22:24:26 will do 22:24:30 mordred: thansk 22:24:47 in fact, honestly, I thnk having good and thorough documentation on the process that can be used wold be good 22:25:17 + 22:25:21 makes sense 22:25:44 mordred: OK, look forward to a new patchset! thanks a lot 22:26:01 if there’s nothing else on this subject 22:26:10 moving on to... 22:26:12 bug #1689830 22:26:13 bug 1689830 in neutron "[RFE] advanced policy for allowed addres pairs" [Wishlist,Triaged] https://launchpad.net/bugs/1689830 22:28:07 So it seems like they want the allowed address pairs 22:28:11 But a subset 22:28:18 Safe to use on a shared network 22:28:41 IIUC 22:29:10 right now allowed address pairs is admin or network owner only 22:29:27 but there’s no validation on which IP is put in the pair correct? 22:29:33 Yeah 22:29:44 anyone else happens to recall this important detail? :) 22:30:04 But that validation isn't really needed 22:30:51 so the proposal is about relaxing the constraint, ie. allowing anyone to create an AAP for a port on a shared network only if it matches a specifc IP on that network? 22:31:07 Yeah, that was my interpretation 22:31:19 Allow regular users on shared network 22:31:41 To use allowed address pair for address they own 22:32:17 from a policy engine standpoint the implementation may look hairy 22:32:20 no? 22:32:24 Yeah 22:32:42 Would require full get_ports call 22:32:47 can RBAC be of any help here? 22:33:01 I don't think so 22:33:12 It might be easier to add another attr 22:33:20 To port 22:33:38 That is validated differently but treated like an allowed address pair 22:33:53 if the policy were to be relaxed 22:35:04 The new attr would have the relaxed policy 22:35:10 allowing any regular user to handle allowed address pairs 22:35:18 what difference would it make? 22:35:41 New attr would only allow addresses of ports the userown 22:35:45 User owns 22:36:47 right, he referes to already allocated ip addresses 22:36:50 to the user 22:38:09 a new attribute would create some confusion though 22:38:59 Yeah 22:39:45 is this something that might be addressed using a different policy rule? 22:40:07 like if the account has a special service role? 22:40:20 like we did for some of the advanced services? 22:40:24 Yeah, but they are basically admitted 22:40:31 Admin on the network 22:40:43 They could use service role 22:40:48 right 22:40:51 that’s what I am thinking 22:40:59 But I got the impression the user was untrusted 22:41:27 probably we need more input about the use case 22:41:29 Maybe we need that clarified 22:41:31 Yeah 22:41:32 yes 22:41:38 OK 22:41:46 I don't think we have enough understanding of his use case 22:41:54 I’ll capture these notes and put in o the report 22:42:14 bug #1690921 22:42:15 bug 1690921 in neutron "[RFE] Manage Broadcast, Unicast, and Multicast traffic" [Wishlist,Triaged] https://launchpad.net/bugs/1690921 22:43:05 I suppose this is one of those RFEs that is a slippery slope 22:43:08 this seems to be a job for CCF integration with sg? I understand that's vaporware right now though. 22:43:57 ihrachys: don’t think so 22:44:20 the way I understand this is that the proposal is to have more fine grained control over packet filtering 22:44:54 I suppose traffic classification would be needed in the solution 22:44:54 by adding more fiedls to security group rules 22:45:04 is classifier all about fine grained? 22:45:48 *isn't 22:46:13 I mean this in case it's not clear: https://review.openstack.org/#/c/333993/ 22:46:19 I think classifier might make sense though 22:46:31 Rather than bolt on more options to sg directly 22:46:56 ihrachys: right, I think a classifier would be needed in the solution, but the user facing API would still be security groups 22:47:04 at least in this RFE, no? 22:47:18 that's what's proposed but I don't think we should go there 22:47:24 Well the API is the classifier 22:47:30 CCF provides a api resource that you tangle to sg 22:47:56 So only change to sg is maybe reference to CCF 22:48:20 why not suggest to the submitter to look at the CCF spec and provide feedback? 22:48:25 yeah. problem is, there is no CCF api right now, and realistically, we can only hope for Q if not R 22:49:12 ihrachys: I’d be wary to use that as an argument though 22:49:38 to allow an RFE such as this to proceed 22:49:48 wouldn’t you agree? 22:49:54 no I don't suggest that at all. I feel CCF is the way to go. 22:50:21 so let's steer the submitter in that direction.... 22:50:54 ihrachys: do you know that the CCF proposal is enough to allow the classification of the traffic as proposed by this RFE? 22:51:26 would need to look at details but that shouldn't stop us if some small bit is missing 22:51:32 we can extend 22:51:48 I can dig and report to LP tomorrow with proper reply 22:51:59 ihrachys: ack 22:52:06 so shall we leave this to you? 22:52:19 yea 22:52:27 made a todo note 22:52:28 okey-dokey 22:52:44 bug #1690937 22:52:45 bug 1690937 in neutron "[RFE] Support allowed address pairs without ip address" [Wishlist,Triaged] https://launchpad.net/bugs/1690937 - Assigned to Ruslan Gustomyasov (rusik) 22:53:19 btw can I make a general remark? 22:53:46 sure 22:53:55 * ihrachys is prepared for a slap 22:53:58 RFEs are supposed to provide use cases, benefits to the use cases etc 22:53:59 not solutions 22:54:06 with no context whatsoever 22:54:14 ++ 22:54:27 this is the second if not the third RFE that is marked as triaged without comments 22:54:36 that tend to clarify what the proposal is for 22:54:54 ack, my fault. :) 22:54:55 that I am seeing right now 22:55:08 ihrachys: I still love you 22:55:39 Timecheck: we have 5 minutes left 22:55:52 mine is just a suggestion so that we can have more meat on the bone when we do come to talk about the RFE during this meeting 22:56:01 we all love ihrachys 22:56:33 this one totally slipped through cracks somehow, I feel embarrassed. don't we allow 0.0.0.0/0 already? 22:56:34 in this case, I am not sure I am able to parse this RFE 22:57:15 also this one 22:57:18 bug #1694165 22:57:19 bug 1694165 in neutron "Improve Neutron documentation for simpler deployments" [Wishlist,Triaged] https://launchpad.net/bugs/1694165 22:57:21 why is it even an RFE? 22:57:53 I removed the RFE tag 22:58:25 OK, 3 mins left let’s ask on bug 1690937 more clarity 22:58:27 bug 1690937 in neutron "[RFE] Support allowed address pairs without ip address" [Wishlist,Triaged] https://launchpad.net/bugs/1690937 - Assigned to Ruslan Gustomyasov (rusik) 22:58:33 for now I suppose we shall wrap up 22:58:42 ok. you want me to ask? 22:58:49 ihrachys: yes, please 22:58:51 ok 22:58:54 I’ll commetn as well 22:59:01 anything else before we close? 22:59:06 #chair kevinbenton 22:59:07 Current chairs: armax kevinbenton 22:59:10 close the meeting 22:59:16 kevinbenton: ^ 22:59:18 :) 22:59:27 show us you were paying attention 22:59:32 #endmeeting