14:00:13 #startmeeting neutron_drivers 14:00:14 Meeting started Fri Jun 21 14:00:13 2019 UTC and is due to finish in 60 minutes. The chair is mlavalle. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:15 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:17 The meeting name has been set to 'neutron_drivers' 14:00:40 hi 14:01:25 hi 14:01:31 o/ 14:01:38 hi 14:02:29 ok 14:03:06 good evening / afternoon / morning to everybody 14:03:13 let's get going 14:03:19 #topic RFEs 14:03:23 hi 14:03:37 Today we have 1 RFE to discuss: https://bugs.launchpad.net/neutron/+bug/1832758 14:03:39 Launchpad bug 1832758 in neutron "[RFE] Allow/deny custom ethertypes in security groups" [Wishlist,New] 14:04:32 that is interesting one :) 14:06:05 I haven't followed comments so far, but as a quick look it looks okay to accept ether types other than IPv4/IPv6. 14:07:04 ovs flow allows us to do it. 14:08:11 amotoki: yes, but the problem here is that in case of iptables fw driver all such custom ethertypes are allows already 14:08:20 and there is no way to block them currently 14:08:44 so we have totally different behaviour depends on what driver is used 14:08:51 yes, with iptables_hybrid we might be able to do it using ebtables, right now it's almost a bug in the iptables_hybrid code imho 14:08:57 slaweq: ah.... the fallback default rule allows all traffic? 14:09:32 at least IIUC this bug report and what njohnston explained us recently, it is like that 14:09:51 so that tells me that we should strive for consistency, right? 14:09:54 so IMO first question here is: 14:10:01 which behaviour is correct 14:10:14 1. iptables_hybrid driver which allows custom ethertypes 14:10:16 or 14:10:25 2. ovs driver which blocks it 14:10:27 another way to pose the question is: 14:11:11 do we believe that there are already users with this use case going on with iptables_hybrid 14:11:13 ? 14:11:38 if yes, that kind of tells us that is the right behavior 14:12:20 yes, there are, but it might have been an oversight since we're allowing traffic that wasn't allowed by an SG rule 14:12:43 I know 14:12:46 mlavalle: as njohnston wrote in comment, we had customers using e.g. InfiniBand which require such traffic 14:13:28 I understand that. But if those users are working with those use cases without a problem, why would we rule it out? 14:14:07 the way I see it, we should catch up with reality 14:14:23 and make it explicit 14:16:17 I generally agree with mlavalle. 14:16:19 One point is how operators can check if such use cases are being used in their deployments. 14:17:15 ahhh, that's good point 14:17:39 the same as us, many of those deployment managers might not even know that this is going on 14:18:19 we had no idea, new deployment used ovsfw and boom! 14:18:47 exactly 14:18:54 IMHO current situation is: correct behaviour is in ovs fw but some users are rely on broken iptables_hybrid driver, so do we want to "break" ovs fw driver and allow such traffic there too, or do we want to break some of existing deployments which uses iptables_hybrid driver? 14:19:50 but we wouldn't be breaking any ovs fw driver sitaution 14:20:01 we would just open up another possibility to them 14:20:10 the converse is not true 14:20:26 i guess i don't think we can change iptables_hybrid without a solution to then allow different ethertypes 14:20:58 with iptables_hybrid users, we would be braking scenarios 14:21:07 mlavalle: exactly 14:21:15 slaweq: why do you think ovs-fw behaviour is correct? 14:21:24 it would be nice if we have a kind of "permissive" mode as selinux does.... but I am not sure it can and is feasible 14:21:38 and yes, that is the next question, yamamoto 14:21:46 yamamoto: because iptables driver now allows traffic which isn't explicity set to be allowed in SG rules 14:21:51 yamamoto: I agree with slaweq. all traffic which aree not defined in SG rules should be dropped I think. 14:22:28 but maybe it's "only" matter of proper documentation where we will say explicity what SG can filter and what not 14:23:11 I think it boils down to saying the community clearly what happened 14:23:17 allow the new behavior 14:23:48 and maybe, as suggested by amotoki's previous comment, provide tools for deployment managers to audit their deployments 14:24:24 and add rules in the case of iptables_hybrid 14:24:30 to make it explicit 14:25:52 can probably do that by changing default to DROP instead of ACCEPT, i don't know 14:26:10 maybe 14:26:10 altough that's at iptables, which isn't in play 14:26:53 i was getting ahead of myself... 14:27:28 maybe the way forward is approve the RFE with the comments ^^^^ and ask for a spec where we can sort out the details 14:27:51 but I don't see us dodging this one 14:28:19 The RFE is about ovs-fw. one idea is to keep the current behavior of iptables-based impl and to add non-IP ethertype to ovs-fw. It would break nothing. 14:28:34 that's true 14:28:49 we can accept non-IP ethertype if ovs-fw is used. 14:29:04 the API extension would help us 14:29:26 and document exactly what happened, so community is aware 14:29:56 i wonder how other impls do 14:29:57 that get's back to the question of should we be doing that? it seems like a security issue since user didn't authorize it 14:30:04 maybe we can align ovs-fw with iptables for now, so allow this non-IP ethertypes and update docs and later as second step add possibility to enable/disable such traffic - this second step would be treated as RFE 14:31:52 how about making it explicitly? for example, we can insert a SG rule to allow non-IP ethertype traffic 14:32:34 that would let you audit it i'd assume, seeing byte/packet counts on a flow rule 14:32:48 amotoki: but this may be tricky to implement in case of iptables_driver, no? 14:33:30 slaweq: perhaps what we need to do is to keep ovs-fw compatible with iptable-hybrid w/ some audit way 14:33:32 it should be made explicit in both cases 14:34:17 with rules 14:35:35 amotoki: I agree, that would be good solution 14:38:31 do we want to make some research about other SG impls? i can look at midonet if desirable 14:39:10 amotoki: what exactly is meant by "keep ovs-fw compatible? 14:39:43 does it mean just opening up those ethertypes by default? 14:39:46 mlavalle: what I think is to allow non-IP traffic by default. 14:40:02 mlavalle: yes 14:40:11 without explicit rules? 14:41:27 I think "explicit (SG) rules" is optional. operators can check such traffic is sent from ovs flow stats (though we need to check it is feasible) 14:41:34 amotoki: or maybe add new config option to allow operator to explicity say: "on this node, non-IP traffic should be allowed with ovs-fw driver" 14:42:11 slaweq: yes, that's another good option 14:43:25 another alternative is to enforce it / make it explicit at the upgrade moment: 14:43:42 1) iptables-hybrid continues as is 14:44:24 2) when user upgrades to ovs-fw, he / she needs to create rules to allow other ether types 14:44:54 this way, over time, we nudge the community to make this bahvior explicit 14:45:24 and we provide tools for the upgrade 14:47:26 mlavalle: does it mean "an SG implementation can choose either behaviors"? 14:48:57 yamamoto: it means that when you upgrade to ovs-fw you have make your choice to allow other ether types explicit with rules in your security groups 14:50:30 this way, as the community adopts ovs-fw, we gradually line up the actual behavior with what is expressed in the security groups 14:50:39 I think yamamoto's question is about third-party SG implementation. do they need to change the behavior on non-IP ether traffic at some time? or do they choose a behavior? 14:51:55 for that part of the proble, I think we need to understand what the current posture is, as suggested by yamamoto himself 14:52:21 what doesn midonet do now? 14:52:40 maybe some investigation is needed to answer this 14:52:52 mlavalle: dunno. i need to investigate 14:53:14 what doesn ovn do, haleyb? 14:53:51 mlavalle: since it uses the ovsfw I'm assuming it drops the traffic, but i have not tested 14:54:49 I think boden can help us with the nsx plugin 14:54:51 haleyb: doesn't it use ovn acls? 14:55:30 yamamoto: i can ask, just not something i've looked at yet 14:56:00 ok, it seems that we need to take a pause on this one and revisit it next week 14:56:28 I'll try to find out what's the situation with networking-odl 14:56:52 does that sound sensible? 14:57:35 +1 14:57:38 +1. it would be nice if we can cover vmware-nsx as well. 14:57:45 +1 14:58:09 although i'm not sure i have time to look at midonet in a week. 14:58:29 amotoki: yes, I'll ask boden for help with that 14:59:08 ok guys, have a great weekend 14:59:14 thanks for attending 14:59:22 #endmeeting