Skip to content

Commit fa3c725

Browse files
committed
Do not set net.ipv4.ip_forward sysctl
To prevent a security issue. More details in the reno. Change-Id: I8bb398e299aa68147004723a18d3a1ec459011e5 Closes-Bug: #1945453 (cherry picked from commit 1bfed04)
1 parent 6f885f3 commit fa3c725

File tree

2 files changed

+16
-1
lines changed

2 files changed

+16
-1
lines changed

ansible/roles/neutron/tasks/config-host.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@
2525
sysctl_set: "{{ should_set }}"
2626
sysctl_file: "{{ kolla_sysctl_conf_path }}"
2727
with_items:
28-
- { name: "net.ipv4.ip_forward", value: 1}
2928
- { name: "net.ipv4.conf.all.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
3029
- { name: "net.ipv4.conf.default.rp_filter", value: "{{ neutron_l3_agent_host_rp_filter_mode }}"}
3130
- { name: "net.ipv4.neigh.default.gc_thresh1", value: "{{ neutron_l3_agent_host_ipv4_neigh_gc_thresh1 }}"}
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
security:
3+
- |
4+
Fixes ``net.ipv4.ip_forward`` not to be enabled by Kolla Ansible
5+
on the default network namespace.
6+
It was enabled on hosts with Neutron L3 Agent (thus in most common
7+
setups with OVS and/or Linux Bridge, but not OVN) and allowed,
8+
unless users had extra iptables rules to avoid that, any traffic
9+
to be accepted for forwarding (as long as it was routable and passed
10+
other checks).
11+
Users of existing setups are advised to re-evaluate whether they
12+
need this sysctl enabled and disable if not necessary.
13+
Kolla Ansible will simply no longer try to set this sysctl at all.
14+
Neutron L3 Agent handles forwarding enablement per managed
15+
namespace.
16+
`LP#1945453 <https://launchpad.net/bugs/1945453>`__

0 commit comments

Comments
 (0)