The OpenDaylight Karaf shell should only be accessible from the admin network (TODO: is that the right network name?). It's currently listening on all IPs, which is insecure. [heat-admin@controller-0 ~]$ sudo netstat -tulpn | grep 8101 tcp 0 0 0.0.0.0:8101 0.0.0.0:* LISTEN 36976/java [heat-admin@controller-0 ~]$ sudo netstat -tulpn | grep 8081 tcp 0 0 192.168.24.11:8081 0.0.0.0:* LISTEN 67377/haproxy tcp 0 0 172.17.1.13:8081 0.0.0.0:* LISTEN 67377/haproxy tcp 0 0 172.17.1.17:8081 0.0.0.0:* LISTEN 36976/java
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2018:2214
I just realized that although this fix improves the security, it was not that big of a security hole because the port was blocked by default in iptables: https://github.com/openstack/tripleo-heat-templates/blob/master/puppet/services/opendaylight-api.yaml#L110