-
Notifications
You must be signed in to change notification settings - Fork 41.6k
pkg/kubelet: add KUBE-FIREWALL-IN chain, move localnet rule to it #91666
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/hold Arguably, iptables should never have allowed this rule to apply, but it does apply and block all traffic between localhost. |
|
@squeed good catch, I only tested that |
|
Created KUBE-FIREWALL-IN, but not KUBE-FIREWALL-OUT, since we don't need it (yet). If this should exist for symmetry, I'm happy to add it. |
|
/hold cancel |
|
/cc @danwinship |
|
/retest |
|
well, this is ugly. |
|
/assign @danwinship |
|
also would love to get this one closed out @kubernetes/sig-network-bugs |
|
/cc |
|
I'm puzzled with this issue, the description of the original issue refers that traffic external to the node can send packets to the localhost of another node, and since it has route_localnet enabled, the external node should be able to reach the localhost of the other node
However, we are only filtering here traffic from/to the same node to localhost, what part I'm missing 😅 ? |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
|
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
Except if this was fixed in another PR, packet with src 192.168.1.2 and dst 127.0.0.1 can go through, can someone reopen this PR ? |
|
@SergeyKanzhelev: Reopened this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@squeed: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/remove-sig node |
|
@squeed: The following tests failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@squeed: PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
|
@k8s-triage-robot: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@champtar observed that the rule added in #91569 still allowed packets through unidirectionally, meaning UDP with a spoofed source wouldn't be caught. So we need to filter on source interface.
However, KUBE-FIREWALL is run on both OUTPUT and INPUT, so it can't reference interfaces. This PR, thus,
to reference source if, not source address.
Signed-off-by: Casey Callendrello cdc@redhat.com
What type of PR is this?
/kind bug
What this PR does / why we need it:
Which issue(s) this PR fixes:
Fixes #90259
Special notes for your reviewer:
You can test this pretty simply using
cnitoolif you don't want to spin up a whole kind cluster.Does this PR introduce a user-facing change?:
/sig network