Bug 1377848 - [DOCS] Provide clear recommendations for Provisioning network security
Summary: [DOCS] Provide clear recommendations for Provisioning network security
Keywords:
Status: CLOSED EOL
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: documentation
Version: 10.0 (Newton)
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: ---
Assignee: RHOS Documentation Team
QA Contact: RHOS Documentation Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-09-20 18:41 UTC by Dan Sneddon
Modified: 2022-08-11 17:21 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-07-07 09:34:56 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker OSP-5367 0 None None None 2022-08-11 17:21:49 UTC

Description Dan Sneddon 2016-09-20 18:41:46 UTC
Description of problem:
The provisioning network that is shared by the Undercloud server and the overcloud nodes for PXE/TFTP is security-sensitive. Anyone who could get on this network to spoof DHCP/TFTP responses could theoretically boot an evil image on one of the overcloud nodes to gain further access. We should recommend access control lists (ACLs) on the router which provides access to the Provisioning network.

Version-Release number of selected component (if applicable):
All

Actual results:
Although this recommendation is made in the Network Reference Architecture, I couldn't find similar recommendations in the Official Installation Guide or the Network Architecture guide.

Expected results:
This network should be protected via an ACL, and recommendations should be made to encourage this.

Additional info:
Here is some sample text which could be used:

"In a standard deployment, the Undercloud server runs DHCP and TFTP services in order to PXE boot the Overcloud nodes. The TFTP protocol has no concept of
security, and the server may be a security risk if left exposed. The Provisioning network should be protected by an access control list (ACL) or otherwise secured in production deployments."

Furthermore, we may want to develop a list of ports which should be open:

* SSH (consider opening up only to administrative admin access)
* HTTPS port for Horizon access
* Public API ports (optionally Admin API in POC envs)

That way we can recommend a secure environment.

I will work on collecting the port list that would have to be open on the Undercloud, but perhaps we can add the recommendation above in the mean time.


Note You need to log in before you can comment on or make changes to this bug.