-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change the default ip forward policy to DROP #2409
base: master
Are you sure you want to change the base?
Conversation
Skipping CI for Draft Pull Request. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: karampok The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/test all |
1 similar comment
/test all |
3eb16d8
to
b5d6be9
Compare
/retest |
When an OCP node has many interfaces, this node can act as router because the current default forward is ACCEPT. The current solution which is blocking ip forwarding only in sysctl level `net.ipv4.ip_forward=0` that is inherited to all interfaces is not working because it breaks the external LB (metallb) case and therefore forwarding on those interface must be on. The IP_FORWARD_MODE to Global is an opt-out option if for any reason there is a use case that accidentally works due to previous ACCEPT policy. Signed-off-by: karampok <karampok@gmail.com>
b5d6be9
to
e3cb8d5
Compare
@trozet this PR should be the minimum changes, CI seems to fails for different reason. Thanks for the feedback |
@karampok: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/hold |
why the hold @karampok ? |
There is the PR that actually does the same ovn-org/ovn-kubernetes#4376, if this PR goes in do we still want to add this? @trozet the on-hold is to avoid just merge without a CI run, and not sure if we need to followup something as part of documentation. |
When an OCP node has many interfaces, this node can act as router because the current default forward is ACCEPT. The current solution which is blocking ip forwarding only in sysctl level
net.ipv4.ip_forward=0
that is inherited to all interfaces is not working because it breaks the external LB (metallb) case and therefore forwarding on those interface must be on.The IP_FORWARD_MODE to Global is an opt-out option if for any reason there is a use case that accidentally works due to previous ACCEPT policy.
https://issues.redhat.com/browse/OCPBUGS-3176