cloudstack-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Chandan Purushothama (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (CLOUDSTACK-5144) [Automation]: Basic Zone Security Groups - SSH to VM is allowed even when there is no ingress rule defined for the security group
Date Tue, 14 Jan 2014 01:05:53 GMT

    [ https://issues.apache.org/jira/browse/CLOUDSTACK-5144?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13870222#comment-13870222
] 

Chandan Purushothama commented on CLOUDSTACK-5144:
--------------------------------------------------

I am able to reproduce this bug on XenServer 6.2 Setup:

1. Deployed a Basic Zone Setup.
2. Deployed a User VM in the admin account.
3. Successfully sshed into the VM inspite of no ingress rules

=====================
Iptables Rules on the Host:
=====================

[root@Rack3Host6 ~]# iptables-save
# Generated by iptables-save v1.3.5 on Mon Jan 13 16:27:17 2014
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [2303893:4874626115]
:BRIDGE-DEFAULT-FIREWALL - [0:0]
:BRIDGE-FIREWALL - [0:0]
:RH-Firewall-1-INPUT - [0:0]
:i-2-3-BASIC - [0:0]
:i-2-3-BASIC-eg - [0:0]
:i-2-3-def - [0:0]
:r-4-BASIC - [0:0]
:s-2-BASIC - [0:0]
:v-1-BASIC - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -m physdev  --physdev-is-bridged -j BRIDGE-FIREWALL
-A FORWARD -m physdev  --physdev-out eth1+ --physdev-is-bridged -j ACCEPT
-A FORWARD -m physdev  --physdev-out eth0+ --physdev-is-bridged -j ACCEPT
-A FORWARD -j DROP
-A BRIDGE-DEFAULT-FIREWALL -m state --state RELATED,ESTABLISHED -j ACCEPT
-A BRIDGE-DEFAULT-FIREWALL -p udp -m physdev  --physdev-is-bridged -m udp --sport 68 --dport
67 -j ACCEPT
-A BRIDGE-DEFAULT-FIREWALL -p udp -m physdev  --physdev-is-bridged -m udp --sport 67 --dport
68 -j ACCEPT
-A BRIDGE-FIREWALL -j BRIDGE-DEFAULT-FIREWALL
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif7.0 --physdev-is-bridged -j i-2-3-def
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif6.0 --physdev-is-bridged -j r-4-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif6.1 --physdev-is-bridged -j r-4-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif3.2 --physdev-is-bridged -j v-1-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif3.0 --physdev-is-bridged -j v-1-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif3.1 --physdev-is-bridged -j v-1-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif4.2 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif4.0 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif4.1 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-in vif4.3 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif4.3 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif4.1 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif4.0 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif4.2 --physdev-is-bridged -j s-2-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif3.1 --physdev-is-bridged -j v-1-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif3.0 --physdev-is-bridged -j v-1-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif3.2 --physdev-is-bridged -j v-1-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif6.1 --physdev-is-bridged -j r-4-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif6.0 --physdev-is-bridged -j r-4-BASIC
-A BRIDGE-FIREWALL -m physdev  --physdev-out vif7.0 --physdev-is-bridged -j i-2-3-def
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p esp -j ACCEPT
-A RH-Firewall-1-INPUT -p ah -j ACCEPT
-A RH-Firewall-1-INPUT -d 224.0.0.251 -p udp -m udp --dport 5353 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -i xenapi -p udp -m udp --dport 67 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m state --state NEW -m udp --dport 694 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state --state NEW -m tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
-A i-2-3-BASIC -j DROP
-A i-2-3-BASIC-eg -j RETURN
-A i-2-3-def -p udp -m physdev  --physdev-in vif7.0 --physdev-is-bridged -m set --set i-2-3-BASIC
src -m udp --dport 53 -j RETURN
-A i-2-3-def -m physdev  --physdev-in vif7.0 --physdev-is-bridged -m set !--set i-2-3-BASIC
src -j DROP
-A i-2-3-def -m physdev  --physdev-out vif7.0 --physdev-is-bridged -m set !--set i-2-3-BASIC
dst -j DROP
-A i-2-3-def -m physdev  --physdev-in vif7.0 --physdev-is-bridged -m set --set i-2-3-BASIC
src -j i-2-3-BASIC-eg
-A i-2-3-def -m physdev  --physdev-out vif7.0 --physdev-is-bridged -j i-2-3-BASIC
-A r-4-BASIC -m physdev  --physdev-in vif6.0 --physdev-is-bridged -j RETURN
-A r-4-BASIC -m physdev  --physdev-in vif6.1 --physdev-is-bridged -j RETURN
-A r-4-BASIC -j ACCEPT
-A s-2-BASIC -m physdev  --physdev-in vif4.2 --physdev-is-bridged -j RETURN
-A s-2-BASIC -m physdev  --physdev-in vif4.0 --physdev-is-bridged -j RETURN
-A s-2-BASIC -m physdev  --physdev-in vif4.1 --physdev-is-bridged -j RETURN
-A s-2-BASIC -m physdev  --physdev-in vif4.3 --physdev-is-bridged -j RETURN
-A s-2-BASIC -j ACCEPT
-A v-1-BASIC -m physdev  --physdev-in vif3.2 --physdev-is-bridged -j RETURN
-A v-1-BASIC -m physdev  --physdev-in vif3.0 --physdev-is-bridged -j RETURN
-A v-1-BASIC -m physdev  --physdev-in vif3.1 --physdev-is-bridged -j RETURN
-A v-1-BASIC -j ACCEPT
COMMIT
# Completed on Mon Jan 13 16:27:17 2014
[root@Rack3Host6 ~]#

[root@Rack3Host6 ~]# ipset -L
Name: i-2-3-BASIC
Type: iphash
References: 4
Header: hashsize: 1024 probes: 8 resize: 50
Members:
10.223.57.82

[root@Rack3Host6 ~]#



> [Automation]: Basic Zone Security Groups - SSH to VM is allowed even when there is no
ingress rule defined for the security group
> ---------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: CLOUDSTACK-5144
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5144
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the default.) 
>          Components: Network Controller
>    Affects Versions: 4.3.0
>            Reporter: Gaurav Aradhye
>            Assignee: Wei Zhou
>            Priority: Blocker
>              Labels: automation
>             Fix For: 4.3.0
>
>         Attachments: MS-Log.txt, agent.log, agent.log, ipset-L output.txt, iptables-rules.txt,
log.zip, management-server.log, management-server.zip
>
>
> In Basic Zone Setup:
> 1. Create an account
> 2. Deploy a VM in that account
> 3. Verify that any ingress rule is not defined for the security group belonging to the
account
> 4. Try SSH to VM using the nic ipaddress from external client
> SSH is successful to the VM where as it should fail when the ingress rule is not defined.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)

Mime
View raw message