Skip to content

Commit 751a4e7

Browse files
kgubefkr
authored andcommitted
Add implementation note for networking rbac restriction
Signed-off-by: Konrad Gube <[email protected]>
1 parent fc87e59 commit 751a4e7

File tree

2 files changed

+21
-2
lines changed

2 files changed

+21
-2
lines changed

Standards/scs-xxxx-v1-provider-network-standard.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ If such a subnet pool is provided, it **MUST** have the `is_default` flag set to
236236
### RBAC Restrictions
237237

238238
By default, users **SHOULD** be prohibited by policy from creating Networking RBAC rules, to prevent the creation of faux provider networks.
239-
The necessary policy change to implement this restriction for the Neutron API can be found in the Networking RBAC documentation [^rbac].
239+
The necessary policy change is described in the implementation notes to this standard.
240240

241241
## Conformance Tests
242242

@@ -250,4 +250,3 @@ The necessary policy change to implement this restriction for the Neutron API ca
250250
[^pf]: <https://docs.openstack.org/api-ref/network/v2/index.html#floating-ips-port-forwarding>
251251
[^ds]: <https://docs.openstack.org/neutron/2024.1/admin/config-ipv6.html>
252252
[^aa]: <https://docs.openstack.org/neutron/2024.1/admin/config-auto-allocation.html>
253-
[^rbac]: <https://docs.openstack.org/neutron/2024.1/admin/config-rbac.html#preventing-regular-users-from-sharing-objects-with-each-other>
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: "Provider Network Standard: Implementation Notes"
3+
type: Supplement
4+
track: IaaS
5+
status: Proposal
6+
supplements:
7+
- scs-xxxx-v1-provider-network-standard.md
8+
---
9+
10+
### Policy adjustment for restricting Networking RBAC
11+
12+
Per default, OpenStack's Networking API allows all user, regardless of role to change the accessibility of networking resources (e.g. networks, routers, security groups) to other projects.
13+
Such shared resources are, without knowledge of the respective project IDs, indistinguishable from resources shared by the CSP, allowing malicious users to present networking resources to other client as coming from the provider.
14+
The Provider Network Standard states that CSPs SHOULD restrict this functionality to administrators, which requires the following change to the `policy.yaml` file of the Neutron API[^rbac]:
15+
16+
```yaml
17+
"create_rbac_policy": "rule:admin_only"
18+
```
19+
20+
[^rbac]: <https://docs.openstack.org/neutron/2024.1/admin/config-rbac.html#preventing-regular-users-from-sharing-objects-with-each-other>

0 commit comments

Comments
 (0)