Public bug reported:

Release:  Pike
Environment:  Ubuntu 16.04
Neutron ML2 Plugin:  Linux Bridge Vlan
Problem:  cannot turn off arp_spoofing on linuxbridge ml2

Background:
According to Pike release notes linuxbridge agent parameter 
“prevent_arp_spoofing” has been depreciated.  Instead, in order to disable 
arp_spoofing (ebtables) on the Port, the Port’s attribute 
“port_security_enabled” should be set to false and no security group is on that 
port.    Further, the Pike documentation says that the Network (and Port) 
“port_security_enabled” is True by default and the Port’s value if not 
explicitly set will default to the Networks value”.  

Problem:
Given the linuxBridge_agent config below and the Network and Port attribute 
“port_security_enabled” set to False, with no security group arp_spoofing is 
being established on the port.    Further we are finding that the default 
“port_security_enabled” value for Networks and Ports are actually set to 
“false” contrary to the documentation.   

Diagnostics:
We’ve been able to trace the port’s “port_security_enabled” value through the 
plugin and we’ve found that at some point that we haven’t identified yet the 
value is being set from false to true.    In the module, 
arp_protect.py::setup_arp_spoofing_proteciton() we’ve printed out the port’s 
value and have prior to the if statement and have found that the value has been 
previously set to True, which at this point drops through the if statement to 
enable ebtables values on the port.  We’ve tried to trace the value back up the 
stack but have not found where it is being reset.    Any thoughts?   Is this a 
bug or are we missing a configuration somewhere?  As a work-around we will set 
the value to false in our environment.   


++ linuxbridge_agent.ini
[linux_bridge]
physical_interface_mappings=physnet1:eth2,physnet2:eth1,physnet3:eth3

[vxlan]
enable_vxlan=false

[agent]
prevent_arp_spoofing=false

[ml2_type_vlan]
network_vlan_ranges=physnet1:55:55,physnet2:50:50,physnet3:210:215

[ml2]
type_drivers=vlan, local
mechanism_drivers=linuxbridge

[securitygroup]
enable_security_group=false
firewall_driver = neutron.agent.firewall.NoopFirewallDriver

** Affects: neutron
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1787908

Title:
  ARP_spoofing on linuxbridge ml2

Status in neutron:
  New

Bug description:
  Release:  Pike
  Environment:  Ubuntu 16.04
  Neutron ML2 Plugin:  Linux Bridge Vlan
  Problem:  cannot turn off arp_spoofing on linuxbridge ml2

  Background:
  According to Pike release notes linuxbridge agent parameter 
“prevent_arp_spoofing” has been depreciated.  Instead, in order to disable 
arp_spoofing (ebtables) on the Port, the Port’s attribute 
“port_security_enabled” should be set to false and no security group is on that 
port.    Further, the Pike documentation says that the Network (and Port) 
“port_security_enabled” is True by default and the Port’s value if not 
explicitly set will default to the Networks value”.  

  Problem:
  Given the linuxBridge_agent config below and the Network and Port attribute 
“port_security_enabled” set to False, with no security group arp_spoofing is 
being established on the port.    Further we are finding that the default 
“port_security_enabled” value for Networks and Ports are actually set to 
“false” contrary to the documentation.   

  Diagnostics:
  We’ve been able to trace the port’s “port_security_enabled” value through the 
plugin and we’ve found that at some point that we haven’t identified yet the 
value is being set from false to true.    In the module, 
arp_protect.py::setup_arp_spoofing_proteciton() we’ve printed out the port’s 
value and have prior to the if statement and have found that the value has been 
previously set to True, which at this point drops through the if statement to 
enable ebtables values on the port.  We’ve tried to trace the value back up the 
stack but have not found where it is being reset.    Any thoughts?   Is this a 
bug or are we missing a configuration somewhere?  As a work-around we will set 
the value to false in our environment.   


  ++ linuxbridge_agent.ini
  [linux_bridge]
  physical_interface_mappings=physnet1:eth2,physnet2:eth1,physnet3:eth3

  [vxlan]
  enable_vxlan=false

  [agent]
  prevent_arp_spoofing=false

  [ml2_type_vlan]
  network_vlan_ranges=physnet1:55:55,physnet2:50:50,physnet3:210:215

  [ml2]
  type_drivers=vlan, local
  mechanism_drivers=linuxbridge

  [securitygroup]
  enable_security_group=false
  firewall_driver = neutron.agent.firewall.NoopFirewallDriver

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1787908/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to