Hi,

Great, looking forward to your article.
If you make some code changes, please create a PR for review and testing.

-Wei

On Mon, 4 Oct 2021 at 13:38, vas...@gmx.de <vas...@gmx.de> wrote:

> With this level of knowledge i can say yes, works like expected.
>
> Overall i have to admitt, that this kind of implementation is something i
> will have to get used to :-D
> Untill now I have been working with the "stateless" ACL approach. Also the
> "mixing" of in- and egress rule can be a bit overwhelming in one big
> table-view. Also i might like to see the exicting ACL Items in the GUI. We
> are often talking about an "empty" ACL - which it isn't. Something you
> constantly will have to keep in mind (If i find a bit of time maybe writing
> some things to the docs, at least the statefulle approach / need of an
> edeggress deny all).
> it "feels" somewhat like the middel between classic network ACL and and
> statefull packet firewall.
> Will have to keep that in mind for security architecture as well as
> documentation of the whole setup i am actually building (especially when
> this infrastructure might face a audit in several months).
>
> regards
>
>
> Am Mo., 4. Okt. 2021 um 11:49 Uhr schrieb Wei ZHOU <ustcweiz...@gmail.com
> >:
>
> > Hi,
> >
> > Good findings. Thanks for sharing.
> >
> > Do you think it works as what you expected?
> >
> > -Wei
> >
> > On Sat, 2 Oct 2021 at 23:41, vas...@gmx.de <vas...@gmx.de> wrote:
> >
> >> Thanks for this Wei,
> >> thant helped me out!
> >>
> >> I will share my findings - maybe someone googling for some more
> >> information
> >> regarding the ACLs will find it useful.
> >>
> >>
> >> - You need to set an "egress deny <port/all> destionation>" to work with
> >> further "egress allow" rules. So i missunderstand the docs regarding
> this
> >> point.
> >> - keep in mind that ACL have limitations and are not the same as an
> >> firewall
> >> - Referenced iptables Tables for the ACL items (and then in the separate
> >> chain of the ACL-List)
> >>      - Egress Items are found in the "mangle" - Table
> >>      - Ingress Items are found in the "forward" - Table
> >>
> >> Another intersting thing to mention:
> >> ACLs are statefull (!) - which is quiet convenient but not allways
> >> default.
> >> And for some applications additonal actions might be needed or
> concidered
> >> during Nw-planning.
> >>
> >> Also Egress and Ingress rules are not related with each other even if
> they
> >> are displayed in one List (or say that it are 2 virtual lists)
> >> Example ACL-List of an tier:
> >>      Pos. 1     egress deny all to 0.0.0.0/0
> >>      Pos. 2     ingress allow 22 from 0.0.0.0/0
> >>
> >> will give you an ssh connection from 0.0.0.0/0 to the network of the
> >> tier.
> >> something one might want to keep in mind.
> >>
> >> Another thing i noticed:
> >> For me to use the "drag&drop" of ACL-items was quiet a mixed back.
> >> the "rule numbers" often were not consistent displayes or updated.
> >> for example i had something like
> >> nr 1-Item A
> >> nr 2-Item B
> >> nr 4-Item D
> >> nr 3-Item C
> >> Which can be a bit cumbersome as on the virtual router sorted the items
> >> correctly in the iptable chains meaning
> >> nr 1- item A
> >> nr 2 - item B
> >> nr 3 - item C
> >> nr 4 - item D
> >>
> >> if you are new to this - one can spend some time to find the mistake he
> >> made..... ;-)
> >>
> >>
> >>
> >> Am Sa., 2. Okt. 2021 um 15:45 Uhr schrieb Wei ZHOU <
> ustcweiz...@gmail.com
> >> >:
> >>
> >> > Hi,
> >> >
> >> > The network acl feature is implemented through iptables and ipset. If
> >> you
> >> > have related knowledge and like to investigate the issue, it would be
> >> nice.
> >> >
> >> > Wei
> >> >
> >> > On Saturday, 2 October 2021, vas...@gmx.de <vas...@gmx.de> wrote:
> >> >
> >> >> I can do. But before raising "issues" I normally try to confirm that
> my
> >> >> issue is to some degree valid. As my knowledge on how and where
> >> Cloudstack
> >> >> is working with the configured ACLs is at the moment quiet shallow, i
> >> will
> >> >> need to try out some things beforehand I guess....
> >> >>
> >> >> Wei ZHOU <ustcweiz...@gmail.com> schrieb am Sa., 2. Okt. 2021,
> 08:50:
> >> >>
> >> >> > Hi,
> >> >> >
> >> >> > Could you create an issue on github and provide more details ?
> >> >> >
> >> >> > -Wei
> >> >> >
> >> >> > On Sat, 2 Oct 2021 at 02:31, vas...@gmx.de <vas...@gmx.de> wrote:
> >> >> >
> >> >> > > Hi everyone,
> >> >> > >
> >> >> > > i currently am looking into the ACL implemention used in VPCs.
> >> >> > >
> >> >> > > However i was not able to locate any of my created "egress" -
> >> entries
> >> >> in
> >> >> > > any of the chains / tables  on the router.
> >> >> > > Tried several things like deny / allow egress traffic for one
> >> client
> >> >> or
> >> >> > the
> >> >> > > whole tier, but i wasn't able to locate the changes on the
> router.
> >> >> > >
> >> >> > > Might one of you can give some where to look / locate egress
> >> related
> >> >> > rules
> >> >> > > in iptables?
> >> >> > >
> >> >> > > In this context, maybe someone can give me an idea if my
> >> >> understanding of
> >> >> > > the documentation regarding egress ACL items is correct.
> >> >> > > From the docs:
> >> >> > > " ... once you add an ACL rule for outgoing traffic, then only
> >> >> outgoing
> >> >> > > traffic specified in this ACL rule is allowed, the rest is
> >> blocked."
> >> >> > > so adding an "eggress + allow" for an instance in the tier shall
> >> >> result
> >> >> > in
> >> >> > > changeing the "default"  of the whole acl to "egress + deny" for
> >> the
> >> >> rest
> >> >> > > of the network automatically.
> >> >> > > is that correct?
> >> >> > >
> >> >> > > Thanks in advance!
> >> >> > >
> >> >> >
> >> >>
> >> >
> >>
> >
>

Reply via email to