Uploaded image for project: 'OpenShift SDN'
  1. OpenShift SDN
  2. SDN-4481

Impact of: allow-from-ingress NetworkPolicy does not consistently allow traffic from HostNetworked pods or from node IP's (packet timeout)

XMLWordPrintable

    • Icon: Spike Spike
    • Resolution: Done
    • Icon: Critical Critical
    • None
    • None
    • None
    • False
    • None
    • False
    • ---
    • 0
    • 0

      Impact of the OCPBUGS-28920 series:

      Which 4.y.z to 4.y'.z' updates increase vulnerability?

      • Upgrades from 4.11 and 4.12.x<48 to 4.12.48+
      • Upgrades from 4.12.x<48 and 4.13.x<29 to 4.13.30+
      • Upgrades from 4.13.x<30 and 4.14.x<9 to 4.14.9+ are not exposed.
      • Upgrades from 4.14.x<9 to 4.15.0-rc.1+ are not exposed.

      Which types of clusters?

      • Clusters with ingress controller config EndpointPublishingStrategy=HostNetwork AND using Network policies with rule policy-group.network.openshift.io/ingress: ""
      • Only clusters on non-cloud platforms use the HostNetwork endpoint publishing strategy: None, BareMetal, VSphere, OpenStack, Nutanix, Libvirt, KubeVirt, EquinixMetal, and External and therefore are affected if they use NetworkPolicies with rule policy-group.network.openshift.io/ingress: ""
      • Clusters on cloud platforms use LoadBalancer endpoint publishing strategy: Alibaba, AWS, Azure, GCP, IBMCloud, and PowerVS, so these platforms are NOT affected

      What is the impact? Is it serious enough to warrant removing update recommendations?

      • Namespaces that allowed incoming connections from the router pods with a given network policy rule ^ will block them after upgrade, which may lead to different disruptions (based on what those pods were doing, but considering they created this network policy in the first place, they are likely to be affected)

      How involved is remediation?

      Is this a regression?

            npinaeva@redhat.com Nadia Pinaeva
            afri@afri.cz Petr Muller
            Votes:
            0 Vote for this issue
            Watchers:
            18 Start watching this issue

              Created:
              Updated:
              Resolved: