Re: Fwd: [ceph-users] Inherent insecurity of OSD daemons when using only a "public network"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 13-1-2017 15:26, Sage Weil wrote:
> In order to make this happen, we'd probably want to make 
> cluster_network default to public_network if it is empty.  That is a 
> little odd on the face of it, but I can't think of a situation where 
> someone would want to define a specific public network and *not* define a 
> private one, so...
> 
> Is that reasonable?

Perhaps something like PR #12929

--WjW

> sage
> 
> 
> On Fri, 13 Jan 2017, Willem Jan Withagen wrote:
> 
>> Hi,
>>
>> This is an observation on the user-list.
>> And I do agree with it whole hartedly.
>>
>> And it stems from the first binding where 0.0.0.0 is used to bind.
>> From the top of my head somewhere in msg/async. It starts out with
>> 0.0.0.0 but on rebinds it binds to an actual ipnr.
>>
>> If the idea here is that we need to bind to either private/public IP, I
>> can look into that.
>>
>> --WjW
>>
>>
>> -------- Forwarded Message --------
>> Subject: [ceph-users] Inherent insecurity of OSD daemons when using only
>> a "public network"
>> Date: Fri, 13 Jan 2017 17:07:13 +0900
>> From: Christian Balzer <chibi@xxxxxxx>
>> Organization: FusionGOL
>> To: ceph-users <ceph-users@xxxxxxxxxxxxxx>
>>
>>
>> Hello,
>>
>> Something I came across a while agao, but the recent discussion here
>> jolted my memory.
>>
>> If you have a cluster configured with just a "public network" and that
>> network being in RFC space like 10.0.0.0/8, you'd think you'd be "safe",
>> wouldn't you?
>>
>> Alas you're not:
>> ---
>> root@ceph-01:~# netstat -atn |grep LIST |grep 68
>> tcp        0      0 0.0.0.0:6813            0.0.0.0:*
>> LISTEN     tcp        0      0 0.0.0.0:6814            0.0.0.0:*
>>       LISTEN     tcp        0      0 10.0.0.11:6815          0.0.0.0:*
>>             LISTEN     tcp        0      0 10.0.0.11:6800
>> 0.0.0.0:*               LISTEN     tcp        0      0 0.0.0.0:6801
>>       0.0.0.0:*               LISTEN     tcp        0      0
>> 0.0.0.0:6802            0.0.0.0:*               LISTEN     etc..
>> ---
>>
>> Something that people most certainly would NOT expect to be the default
>> behavior.
>>
>> Solution, define a complete redundant "cluster network" that's identical
>> to the public one and voila:
>> ---
>> root@ceph-02:~# netstat -atn |grep LIST |grep 68
>> tcp        0      0 10.0.0.12:6816          0.0.0.0:*
>> LISTEN     tcp        0      0 10.0.0.12:6817          0.0.0.0:*
>>       LISTEN     tcp        0      0 10.0.0.12:6818          0.0.0.0:*
>>             LISTEN     etc.
>> ---
>>
>> I'd call that a security bug, simply because any other daemon on the
>> planet will bloody bind to the IP it's been told to in its respective
>> configuration.
>>
>> The above is with Hammer, any version.
>>
>> Christian
>> -- 
>> Christian Balzer        Network/Systems Engineer
>> chibi@xxxxxxx   	Global OnLine Japan/Rakuten Communications
>> http://www.gol.com/
>> _______________________________________________
>> ceph-users mailing list
>> ceph-users@xxxxxxxxxxxxxx
>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>> --
>> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
>> the body of a message to majordomo@xxxxxxxxxxxxxxx
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>
>>
> --
> To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 

--
To unsubscribe from this list: send the line "unsubscribe ceph-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [CEPH Users]     [Ceph Large]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]
  Powered by Linux