Page MenuHomePhabricator

openstack: clarify IPv6 firewalling
Closed, ResolvedPublic

Description

A few things to clarify:

  • VMs are not protected by NAT anymore. Figure out the right firewalling semantics.
  • We need to make sure neutron security groups works as expected using IPv6.

Event Timeline

Restricted Application removed a subscriber: taavi. · View Herald TranscriptSep 13 2024, 12:48 PM
aborrero renamed this task from openstack: verify security groups settings for IPv6 to openstack: clarify IPv6 firewalling.Oct 14 2024, 3:33 PM
aborrero updated the task description. (Show Details)
aborrero changed the task status from Open to In Progress.Oct 14 2024, 3:34 PM
aborrero claimed this task.
aborrero edited projects, added User-aborrero; removed SRE.

Change #1080267 had a related patch set uploaded (by Arturo Borrero Gonzalez; author: Arturo Borrero Gonzalez):

[operations/puppet@production] cloudgw: forward all VRF traffic without restrictions for IPv6

https://gerrit.wikimedia.org/r/1080267

Change #1080267 merged by Arturo Borrero Gonzalez:

[operations/puppet@production] cloudgw: forward all VRF traffic without restrictions for IPv6

https://gerrit.wikimedia.org/r/1080267

Mentioned in SAL (#wikimedia-cloud) [2024-10-15T11:33:17Z] <arturo> cloudgw maintenance, firewall change for T374714

problem detected: remote_group_name parameter in tofu-infra security group rules is not getting resolved.

problem detected: remote_group_name parameter in tofu-infra security group rules is not getting resolved.

fixed with this https://gitlab.wikimedia.org/repos/cloud/cloud-vps/tofu-infra/-/merge_requests/99

aborrero closed this task as Resolved.EditedOct 16 2024, 3:00 PM

For now, the semantics are:

  • the default neutron security group in each project will allow: all egress IPv6 traffic, inbound IPv6 traffic only from the same tenant
  • if the IPv6-enabled VM wants to be directly reachable from the internet in its IPv6 address, it can be configured via another security group.
  • the perimetral firewall at cloudgw does not enforce anything related to IPv6. All IPv6 traffic is free to flow at this point of the edge network, until we decide to introduce cloud-wide filters or whatever.