On 01/14/2013 03:39 PM, Aaron Rosen wrote: > Hi Akihiro, > > Thanks for your feedback. Responses inline. > > On Sat, Jan 12, 2013 at 2:44 AM, Akihiro MOTOKI <[email protected] > <mailto:[email protected]>> wrote: > > Hi Aaron, > > Sorry for the late feedback. > > I have some comments on the spec. > > - Who can change the port security? If the network physical > infrastructure provides an address > space isolation among logical network, a tenant (a regular use) may > change port security freely. > On the other hand, if the network physical infrastructure requires MAC > uniqueness (for example, > network_type == flat), only admin should change port security. > > Correct, I was thinking about building a flag > (require_port_security_on_shared_networks and > require_port_security_on_provider_networks) in which it would force all > ports created on that network to use port security (and would require > the admin to remove that setting). Do you think this is something we > should build in?
I'd recommend not trying to base any behavior on whether a network was created using the provider attributes or not. Once they are created, provider networks are indistinguishable from those created from a pool for a tenant. -Bob > > > > - Why can we disable port security when a port is associated with a > security group? > The limitation section in the spec document says "if a port is > associated with a security group > one cannot remove the port security setting as port security is > required for security groups to work." > > > The reason for this is if we allow the vm to change it's source ip then > it would be possible for them to get around the security group applied > to the port. > > > A usual case is a case where a VM wants to another IP address in > addition to its IP address assigned, > but it is likely a user still wants to use security group (to drop > incoming packets to undesired L4 ports). > > > In this use case you are talking about, are you meaning on the same vif > using ip aliases? If so then the user should update the port to include > this ipaddress and then add the desired security group settings for the > communication they want. It's not possible to support port security on a > port for only one ipaddress and not the other because of the reason i > mentioned previously. The user could create another port with out port > security though. > > > The current secgroup implementation honors the original security group > implementation in nova > and IP/MAC spoofing rules are added automatically as provider rules. > We can change the provider rules according to port security state > for the port. > > I hope my understanding it correct. > > Thanks, > Akihiro > > 2013/1/5 Aaron Rosen <[email protected] <mailto:[email protected]>>: > > Hi, > > > > I'm starting to work on the following blueprint > > > > (https://blueprints.launchpad.net/quantum/+spec/port-security-api-base-class) > > and would like to run this spec by the community for feedback. > > > > > > https://docs.google.com/document/d/18trYtq3wb0eJK2CapktN415FRIVasr7UkTpWn9mLq5M/edit > > > > Thanks, > > > > Aaron > > > > _______________________________________________ > > OpenStack-dev mailing list > > [email protected] > <mailto:[email protected]> > > http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev > > > > -- > Akihiro MOTOKI <[email protected] <mailto:[email protected]>> > > -- > Mailing list: https://launchpad.net/~quantum-core > Post to : [email protected] > <mailto:[email protected]> > Unsubscribe : https://launchpad.net/~quantum-core > More help : https://help.launchpad.net/ListHelp > > > > -- Mailing list: https://launchpad.net/~quantum-core Post to : [email protected] Unsubscribe : https://launchpad.net/~quantum-core More help : https://help.launchpad.net/ListHelp

