Skip to content

Commit 1fd68c8

Browse files
committed
Rework example security group to avoid SSH and ICMP in default secgroup
The recent RegreSSHion CVE highlighted the need to opt into opening SSH.
1 parent b6d80b8 commit 1fd68c8

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

examples/networks.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,12 +125,16 @@ openstack_router_demo:
125125
# List of security groups in the openstack demo project.
126126
# Format is as required by the stackhpc.os-networks role.
127127
openstack_security_groups:
128-
# Default security group for the openstack demo project.
129-
- name: default
128+
# ICMP security group for the openstack demo project.
129+
- name: ICMP
130130
project: demo
131131
rules:
132132
# Allow ICMP (for ping, etc.).
133133
- protocol: icmp
134+
# SSH security group for the openstack demo project.
135+
- name: SSH
136+
project: demo
137+
rules:
134138
# Allow SSH.
135139
- protocol: tcp
136140
port_range_min: 22

0 commit comments

Comments
 (0)