Uploaded image for project: 'OpenShift Core Networking'
  1. OpenShift Core Networking
  2. CORENET-4484

Impact of: allow-from-ingress NetworkPolicy does not consistently allow traffic from HostNetworked pods or from node IP's (packet timeout)

XMLWordPrintable

    • None
    • False
    • Hide

      None

      Show
      None
    • False
    • None
    • None
    • None

      Impact of the OCPBUGS-28920 series:

      Which 4.y.z to 4.y'.z' updates increase vulnerability?

      • Upgrades from 4.11 and 4.12.x<48 to 4.12.48+
      • Upgrades from 4.12.x<48 and 4.13.x<29 to 4.13.30+
      • Upgrades from 4.13.x<30 and 4.14.x<9 to 4.14.9+ are not exposed.
      • Upgrades from 4.14.x<9 to 4.15.0-rc.1+ are not exposed.

      Which types of clusters?

      • Clusters with ingress controller config EndpointPublishingStrategy=HostNetwork AND using Network policies with rule policy-group.network.openshift.io/ingress: ""
      • Only clusters on non-cloud platforms use the HostNetwork endpoint publishing strategy: None, BareMetal, VSphere, OpenStack, Nutanix, Libvirt, KubeVirt, EquinixMetal, and External and therefore are affected if they use NetworkPolicies with rule policy-group.network.openshift.io/ingress: ""
      • Clusters on cloud platforms use LoadBalancer endpoint publishing strategy: Alibaba, AWS, Azure, GCP, IBMCloud, and PowerVS, so these platforms are NOT affected

      What is the impact? Is it serious enough to warrant removing update recommendations?

      • Namespaces that allowed incoming connections from the router pods with a given network policy rule ^ will block them after upgrade, which may lead to different disruptions (based on what those pods were doing, but considering they created this network policy in the first place, they are likely to be affected)

      How involved is remediation?

      Is this a regression?

              npinaeva@redhat.com Nadia Pinaeva (Inactive)
              afri@afri.cz Petr Muller
              None
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              18 Start watching this issue

                Created:
                Updated:
                Resolved: