[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
       Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1507846

Title:
  Filtering ICMP packet based on ICMP code

Status in neutron:
  Expired

Bug description:
  (a)Summary : Support for filtering based on ICMP codes is missing in 
Openstack firewall.
  Further information :
  (b)High level description: Currently Openstack firewall rules allow filtering 
of ICMP packets.However filtering is done for all ICMP packets. There can be a 
possible improvement in the Firewall rules, by introducing filetration of ICMP 
packets based on the ICMP packet type/code.
  There are various possible ICMP packet types ( for example, Packet type 8 
corresponds to ICMP Echo while Packet type 0 is an ICMP Echo Response). It is 
possible to provide a more channeled functionality to the user by providing the 
support for filteration based on ICMP packets.

  (b.1)Pre-conditions:  As this is more of a feature improvement than an all 
out bug,there are no specific precondition. However, the following requirements 
can be mapped to the pre-condition of the bug:
         * User wants to create a firewall which allows incoming ICMP pings, 
but blocks ICMP ping from the current subnet.
         [ Note ]:
         (a) This is applicable to all tenants
         (b) This feature assumes the requirement that user wants a Node to 
accept a ping request and respond to it, but not to send a request out.

  (b.2)Step-by-step reproduction steps:
         * User creates a firewall rule with  ICMP protocol with specific 
source/destination IP.
         * User creates a firewall rule with specific ports.
         * User cannot proceed with the rule which allows his requirement to be 
fulfilled. ( allows incoming ICMP ping requests, but blocks outgoing ICMP ping 
requests)

  (b.3)Expected output: User should be able to create a Firewall rule,
  which allows the userś requirement to be fulfilled.

  (b.4)Actual output: Such a facility in the firewall rule is not
  available.

  (b.5)Version:
  OpenStack version (Specific stable branch, or git hash if from trunk): Tag ID 
: c1310f32fbb6dfa958bb31152ee5b492b177c6cb
  Linux distro, kernel.: Ubuntu 14.04
  DevStack or other _deployment_ mechanism: devstack
  Environment: Neutron with Firewall Extensions, on a single node machine. 
However, the above requirement is independent of the environment.

  (c)Perceived severity: Medium/Low depending on the importance of Deep
  Packet Inspection.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1507846/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to