16:04:11 #startmeeting vpnaas 16:04:11 Meeting started Tue Sep 8 16:04:11 2015 UTC and is due to finish in 60 minutes. The chair is pc_m. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:04:12 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:04:14 The meeting name has been set to 'vpnaas' 16:04:29 #topic announcements 16:05:09 The endpoint-groups code is out for review, along with the neutron-client changes. 16:05:49 o/ 16:06:06 I *may* have a version of the scripts working that will allow for VPN functional tests on Neutron jobs. 16:06:17 Testing, but it works pretty good so far. 16:06:44 There is a fix out for review for coverage testing. 16:07:11 Finally, the neutron client experimental job is out for review. Needs core review and then infra review. 16:07:14 beagles: hi 16:07:25 Anyone have any other big announcements? 16:08:21 I have an potential issue I would like to bring up - is this the appropriate time or is there a better spot in the agenda? 16:08:35 beagles: wait for open discussion. 16:08:40 right 16:08:57 #topic Endpoint Groups 16:09:34 Please help review the code #link https://review.openstack.org/#/c/212692/ and neutron-client https://review.openstack.org/#/c/219455/ 16:10:13 The developer reference doc on this (and the multiple local subnet feature) has been upstreamed. 16:10:38 #topic Multiple Local Subnets 16:10:46 The dev ref is #link https://review.openstack.org/#/c/191944 16:11:14 Will start on this, as soon as the endpoints code is upstreamed. 16:11:41 #topic VPN Functional Tests 16:11:56 So it looks like #link https://review.openstack.org/#/c/203201/14 may do the trick. 16:12:20 I tested a neutron fix with a bug and without a bug and the VPN tests failed/passed, as expected. 16:12:44 Will likely wait for dougwig to get back and work on core reviews. 16:13:10 #topic Reviews 16:13:21 Please help out... https://review.openstack.org/#/q/status:open+project:openstack/neutron-vpnaas,n,z 16:13:54 For bugs, we have https://goo.gl/XNtnLX for the latest. 16:14:14 I think most have people assigned (Yay!) 16:15:02 Any particular bugs we need to discuss here? 16:15:33 yes. https://bugs.launchpad.net/neutron/+bug/1491679 16:15:35 Launchpad bug 1491679 in neutron "ipsec-site-connection is not back to ACTIVE state after updating admin_state_up from True -> False -> True" [Undecided,New] 16:16:33 madhu_ak: go ahead... 16:16:57 based on my research, I concluded that, when using openswan vs strongswan, I found it is working well when using later than former 16:17:36 With strongswan, its is minutes longer to see the respective status.. 16:17:48 s/its is/its taking 16:18:43 so you are changing the admin status of the connection, right? 16:18:52 Righ 16:18:55 Right 16:19:13 With both OpenSwan and Strongswan are they stopping and then resuming status? 16:19:23 On their own, or with traffic? 16:19:33 with openswan, it dont..with strongswan it does 16:20:10 Let's take one at a time... 16:20:24 With OpenSwan, does it work if you admin stop/start both sides? 16:20:42 nope.. 16:21:10 what about when DPD is changed? 16:21:15 (mode) 16:21:39 with openswan, I changed the dp action to restart, the traffic still flows when changing admin state as stop 16:21:40 I know there are several different settings. 16:22:07 madhu_ak: that's bad. 16:22:27 Did you find any bug reports on OpenSwan 16:22:29 ? 16:22:48 have seen people discussiong about dpd status with openswan.. 16:23:04 There are other modes too, not sure if any help there. 16:23:18 I *understood* that, dpd actions does not work proper with openswan 16:23:20 For StrongSwan, does it work, but takes longer than expected? 16:23:45 yep, for strongswan, its works, but taking longer time than expected.. 16:24:09 even with dpd action, interval and timeout, stringswan takes time to update 16:24:34 more than a minute beyond setting? 16:24:40 yep 16:24:48 roughly, 15-20 minutes 16:24:52 wow 16:25:06 Did you happen to try IKEv2? 16:25:17 I hear that has the DPD built in. 16:25:46 I think yes, its uses psk 16:26:08 ? 16:26:33 its uses psk, and ikev2 16:26:45 I can still confirm and comment on the bug 16:27:14 There is differences between using IKE policy with v1 vs v2 16:27:20 s/is/are 16:27:47 My understanding is that IKE policy v2 has DPD built in 16:28:31 So, do you think the issues are problems with the underlying *Swan packages or with the reporting of status by the OpenStack drivers? 16:28:57 IOW, does the traffic actually start/stop on time, and the status is just wrong. 16:29:27 *Swan packages...the traffic actually doesn't stop with start/stop on time 16:29:40 If it's a *Swan issue, there's not much we can do, unless they have some workarounds that we can deploy. 16:30:11 maybe if anyone can reproduce and comment on that bug would be helpful 16:30:38 anyone able to confirm? 16:30:53 so we can get to know the clear info - meaning, having different views should be good 16:31:50 Can anyone try this? 16:33:05 I can retry again and post comment accordingy 16:33:12 Well, hopefully someone can get some time to try it. I may be able later this week or next week. Pretty tied up right now. 16:33:36 any value to trying with libreswan? 16:33:38 #action People to try to confirm 1491679 bug 16:33:55 I shall try this today or tomo and let u know.. madhu_ak 16:33:56 Any other bugs to discuss, before open discussion? 16:33:59 havent tried with that driver beagles 16:34:03 (sorry, my network has been hiccuping) 16:34:32 Aish: Thanks! 16:34:38 sure 16:34:53 I ran into an issue with libreswan where its use of the capabilities library prevents it from establishing connections because ipsec.secrets isn't owned by root 16:34:55 np pc_m 16:34:55 fun! 16:34:56 beagles: Can't hurt, I guess it is similar to openswan. 16:35:00 yeah 16:35:33 #topic Open Discussion 16:35:39 beagles: You had an item... 16:35:52 yeah, kind of jumped the gun... see above 16:36:07 that led me to do some research and discovered that most of the references (manpages, etc) indicate the file should be owned by root/super-suer 16:37:00 does this indicate a general problem or should a fix be localized to libreswan driver? 16:38:06 beagles: I haven't seen that with open/strongswan 16:39:07 pc_m yeah I figured that was likely the case. What are the implications of having not restricting it to root/super-user? 16:39:59 I guess outside of devstack, it would be whatever UID the deployment runs the agent as - which is restricted itself in a way 16:40:08 beagles There could possibly be some interaction here with the fix I just made for https://bugs.launchpad.net/neutron/+bug/1488320 16:40:09 Launchpad bug 1488320 in neutron "neutron-vpnaas uses bad file permissions on PSK file" [Undecided,In progress] - Assigned to Al Miller (al-miller) 16:40:19 beagles: not sure. Usually the template is copied to the UUID of the process for the driver. 16:40:50 ajmiller: Is this the same file? 16:40:53 yes 16:40:57 I beleive so 16:41:33 beagles: Do you have ajmiller's fix? ajmiller did you see connection issues? 16:41:54 #link https://review.openstack.org/216810 16:42:22 ajmiller: More correctly, did you try end-to-end connection? 16:43:29 pc_m yes: I think I have that fix.. it is quite likely he is seeing something different. Basically I get a permission error when reading ipsec.secrets when starting to listen for connections 16:43:39 pc_m : same file though 16:43:40 pc_m, Yes, I did do a full set of manual tests. I will go back and double-check though. 16:44:33 it is most likely libreswan specific because of that capabilities library thing - same root cause as the recent .ctl/.pid file cleanup patch 16:44:44 ajmiller: May be worth two setup two routers and ensure traffic passes (though scenario test should do that). 16:44:52 (really bizarre actually... but what can you do) 16:45:43 Corrected #link https://review.openstack.org/#/c/216812/ 16:46:10 ajmiller, I think in my case things worked *before* your patch because the perms would've been more permissive 16:46:11 beagles: wondering if it works w/o ajmiller's fix? 16:46:26 pc_m: yeah.. was just thinking that. 16:46:30 beagles: yeah, that is what I'm wondering. 16:47:02 ajmiller: Is your fix for sswan? 16:47:10 only? 16:47:24 pc_m, I suspect ajmiller's patch is more correct from a security standpoint however 16:47:30 looking at code, it appears to be both. 16:47:36 beagles pc_m It started out for openswan only, then based on review feedback made it more broad, for the other drivers that used that code. 16:47:57 i.e. drivers that called replace_file() 16:47:59 beagles: So you may want to confirm if the permissions change anything. 16:48:10 pc_m: will do 16:48:26 beagles: Does sound like a libreswan only fix though. 16:48:42 pc_m: I'm cool with that 16:49:42 OK. Anything else to discuss? 16:50:55 Thanks for joining in everyone. 16:51:07 #endmeeting