Bug 1451910
Summary: | [doc] Service is not blocked by dns egress policy rule | ||
---|---|---|---|
Product: | OpenShift Container Platform | Reporter: | Weibin Liang <weliang> |
Component: | Networking | Assignee: | Ravi Sankar <rpenta> |
Status: | CLOSED ERRATA | QA Contact: | Meng Bo <bmeng> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 3.6.0 | CC: | aos-bugs, bbennett, rpenta, yadu |
Target Milestone: | --- | ||
Target Release: | 3.7.0 | ||
Hardware: | Unspecified | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | No Doc Update | |
Doc Text: |
Documentation PR was provided.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-11-28 21:55:46 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Weibin Liang
2017-05-17 20:17:56 UTC
In order to reproduce above issue, router need to be created first. We do egress network policy service endpoint filtering at node kubeproxy and when router is involved kubeproxy is bypassed and egress enforcement is not applied. This applied to both dnsName and cidrSelector fields in egress network policy. May be we should also do egress service endpoint filtering at the router level. Clayton and I are in agreement that we can document that if you want to protect against people with permission to make routes and services, you need to restrict their ability to make endpoints. If we put that documentation in the egress firewall section, that is acceptable. Commit pushed to master at https://github.com/openshift/openshift-docs https://github.com/openshift/openshift-docs/commit/9add5ecccd34bc9027325373a90d920b97865bd9 Merge pull request #4630 from pravisankar/egress-policy-limitation Bug 1451910 - Caution about egress network policy limitation The Caution part about the egressnetworkpolicy looks good and have been merged. Move the bug to verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2017:3188 |