Re: Fwd: [ceph-users] Inherent insecurity of OSD daemons when using only a "public network"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In order to make this happen, we'd probably want to make 
cluster_network default to public_network if it is empty.  That is a 
little odd on the face of it, but I can't think of a situation where 
someone would want to define a specific public network and *not* define a 
private one, so...

Is that reasonable?
sage


On Fri, 13 Jan 2017, Willem Jan Withagen wrote:

> Hi,
> 
> This is an observation on the user-list.
> And I do agree with it whole hartedly.
> 
> And it stems from the first binding where 0.0.0.0 is used to bind.
> From the top of my head somewhere in msg/async. It starts out with
> 0.0.0.0 but on rebinds it binds to an actual ipnr.
> 
> If the idea here is that we need to bind to either private/public IP, I
> can look into that.
> 
> --WjW
> 
> 
> -------- Forwarded Message --------
> Subject: [ceph-users] Inherent insecurity of OSD daemons when using only
> a "public network"
> Date: Fri, 13 Jan 2017 17:07:13 +0900
> From: Christian Balzer <chibi@xxxxxxx>
> Organization: FusionGOL
> To: ceph-users <ceph-users@xxxxxxxxxxxxxx>
> 
> 
> Hello,
> 
> Something I came across a while agao, but the recent discussion here
> jolted my memory.
> 
> If you have a cluster configured with just a "public network" and that
> network being in RFC space like 10.0.0.0/8, you'd think you'd be "safe",
> wouldn't you?
> 
> Alas you're not:
> ---
> root@ceph-01:~# netstat -atn |grep LIST |grep 68
> tcp        0      0 0.0.0.0:6813            0.0.0.0:*
> LISTEN     tcp        0      0 0.0.0.0:6814            0.0.0.0:*
>       LISTEN     tcp        0      0 10.0.0.11:6815          0.0.0.0:*
>             LISTEN     tcp        0      0 10.0.0.11:6800
> 0.0.0.0:*               LISTEN     tcp        0      0 0.0.0.0:6801
>       0.0.0.0:*               LISTEN     tcp        0      0
> 0.0.0.0:6802            0.0.0.0:*               LISTEN     etc..
> ---
> 
> Something that people most certainly would NOT expect to be the default
> behavior.
> 
> Solution, define a complete redundant "cluster network" that's identical
> to the public one and voila:
> ---
> root@ceph-02:~# netstat -atn |grep LIST |grep 68
> tcp        0      0 10.0.0.12:6816          0.0.0.0:*
> LISTEN     tcp        0      0 10.0.0.12:6817          0.0.0.0:*
>       LISTEN     tcp        0      0 10.0.0.12:6818          0.0.0.0:*
>             LISTEN     etc.
> ---
> 
> I'd call that a security bug, simply because any other daemon on the
> planet will bloody bind to the IP it's been told to in its respective
> configuration.
> 
> The above is with Hammer, any version.
> 
> Christian
> -- 
> Christian Balzer        Network/Systems Engineer
> chibi@xxxxxxx   	Global OnLine Japan/Rakuten Communications
> http://www.gol.com/
> _______________________________________________
> ceph-users mailing list
> ceph-users@xxxxxxxxxxxxxx
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
> --
> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 
> 
--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux