[RFE] API: allow to disable anti-spoofing but not SGs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
New
|
Wishlist
|
Ihar Hrachyshka |
Bug Description
Right now, port security API - seems to [1] - disable both ACL filtering (SGs) and anti-spoofing (allowed address pairs logic). An argument may be made to allow to disable anti-spoofing but still implement ACL filtering on a port. (This actually happened in one of synthetic NFV test environments in-house.) In this case, the user story would look like as follows:
0. A user creates a SG with TCP blocked.
1. A user creates a port using this SG.
2. A user uses a new API to mark the port to allow MAC spoofing.
3. A user sends TCP traffic using a different MAC through the port and sees it blocked.
4. A user sends UDP traffic using a different MAC through the port and see it's not blocked.
Allowed-
description: | updated |
summary: |
- API: allow to disable anti-spoofing but not SGs + [RFE] API: allow to disable anti-spoofing but not SGs |
Changed in neutron: | |
importance: | Undecided → Low |
importance: | Low → Wishlist |
assignee: | nobody → Ihar Hrachyshka (ihar-hrachyshka) |
tags: | added: rfe-approved |
Hi Ihar, we will have drivers meeting on Friday 1400UTC (https:/ /meetings. opendev. org/#Neutron_ drivers_ Meeting) where we will discuss this proposal, you can join the discussion on IRC #openstack-neutron.