Do not set net.ipv4.ip_forward sysctl
To prevent a security issue. More details in the reno. Change-Id: I8bb398e299aa68147004723a18d3a1ec459011e5 Closes-Bug: #1945453
This commit is contained in:
parent
56938253a7
commit
1bfed045cf
@ -25,7 +25,6 @@
|
||||
sysctl_set: "{{ should_set }}"
|
||||
sysctl_file: "{{ kolla_sysctl_conf_path }}"
|
||||
with_items:
|
||||
- { name: "net.ipv4.ip_forward", value: 1}
|
||||
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
|
||||
- { name: "net.ipv4.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh1 }}"}
|
||||
|
16
releasenotes/notes/bug-1945453-c410cc090cb85feb.yaml
Normal file
16
releasenotes/notes/bug-1945453-c410cc090cb85feb.yaml
Normal file
@ -0,0 +1,16 @@
|
||||
---
|
||||
security:
|
||||
- |
|
||||
Fixes ``net.ipv4.ip_forward`` not to be enabled by Kolla Ansible
|
||||
on the default network namespace.
|
||||
It was enabled on hosts with Neutron L3 Agent (thus in most common
|
||||
setups with OVS and/or Linux Bridge, but not OVN) and allowed,
|
||||
unless users had extra iptables rules to avoid that, any traffic
|
||||
to be accepted for forwarding (as long as it was routable and passed
|
||||
other checks).
|
||||
Users of existing setups are advised to re-evaluate whether they
|
||||
need this sysctl enabled and disable if not necessary.
|
||||
Kolla Ansible will simply no longer try to set this sysctl at all.
|
||||
Neutron L3 Agent handles forwarding enablement per managed
|
||||
namespace.
|
||||
`LP#1945453 <https://launchpad.net/bugs/1945453>`__
|
Loading…
Reference in New Issue
Block a user