We have routable floating IPs for the various services that get assigned
dynamically as aliases on a (non-loopback) device.  No NAT is being done
for these currently.

On Thu, Jun 18, 2015 at 1:57 PM, Shaun Crampton <
shaun.cramp...@metaswitch.com> wrote:

>  Sorry Nick, I think we missed that use-case when tightening up those
> rules but I think it’s something that we want to support.
>
>  I’ve filed a Github issue to track this:
> https://github.com/Metaswitch/calico/issues/659.
>
>  How are you exposing the services, are you running them on 127.0.0.1 (or
> 0.0.0.0) and then NATing or is the VM just talking to the host on its
> external IP address?
>
>  Thanks,
>
>  -Shaun
>
>   From: Nick Bartos <n...@pistoncloud.com>
> Date: Thursday, 18 June 2015 13:30
> To: "calico-tech@lists.projectcalico.org" <
> calico-tech@lists.projectcalico.org>
> Subject: Re: [calico-tech] Problem with new iptables rules in
> calico/master
>
>   Actually now that I think about it, changing the insert order is still
> sub-optimal as this means that the security policy for the VM will be
> bypassed for those rules.  It seems like the security group rules still
> need to be applied on INPUT, not just forward.
>
> On Thu, Jun 18, 2015 at 1:24 PM, Nick Bartos <n...@pistoncloud.com> wrote:
>
>> A very recent change modified the input iptables rules.  However, this
>> resulted in an unfortunate situation.
>>
>>  The felix rules ("INPUT -j felix-INPUT", "FORWARD -j felix-FORWARD")
>> are inserted to the top of the chain, preempting any rules that were set
>> before it.  Later in the felix input rule, there is this:
>>
>>  -A felix-INPUT -m conntrack --ctstate INVALID -j DROP
>> -A felix-INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
>> -A felix-INPUT -d 127.0.0.1/32 -i tap+ -p tcp -m tcp --dport 8775 -j
>> ACCEPT
>> -A felix-INPUT -i tap+ -p udp -m udp --sport 68 --dport 67 -j ACCEPT
>> -A felix-INPUT -i tap+ -j DROP
>>
>>  This basically means any previous allow rules on the input chain from
>> the VMs are disregarded.  This is a problem for us as we run some services
>> locally on the hypervisors that the VMs need to be able to talk to.
>>
>>  While this was sort of the case with the forward chain before, it was
>> generally fine, since the outbound security policy was respected (which for
>> most cases is allow).
>>
>>  Is there a way to get the felix-INPUT (and maybe the felix-FORWARD)
>> jumps to be inserted further down the list (although putting it way down at
>> the bottom wouldn't work for us as we have a debug log for the catch-all
>> policy drop there)?  Or can you think of another solution?
>>
>
>
_______________________________________________
calico-tech mailing list
calico-tech@lists.projectcalico.org
http://lists.projectcalico.org/listinfo/calico-tech

Reply via email to