Tuesday, 2024-04-02

SvenKieskewondering if this issue/bugfix qualifies as a security issue and if we should publish a security notice for it? https://bugs.launchpad.net/python-openstackclient/+bug/205462912:22
fungiSvenKieske: i'm missing crucial details about the impact of that bug. is it that if you use osc to create a new sg and tell it not to base it on the default sg, it does so anyway?12:28
fungiif so, i guess the risk is that people creating security groups might think they're not based on their default security group when they really are, potentially exposing systems to the internet in unwanted ways?12:59
SvenKieskefungi: the linked patch has more details: https://review.opendev.org/c/openstack/python-openstackclient/+/909815 "13:19
SvenKieskeCurrently the Default setting for CustomSG Rule13:19
SvenKieskeis set to True, this means all new SGs inherit13:19
SvenKieskethese rules, with no way for user to override13:20
SvenKieskethis behavior."13:20
fungiSvenKieske: okay, so revisiting the scenario then, osc doesn't currently provide users with a way to create security groups which don't inherit rules from the default security group, and it's being improved to make that possible. that sounds like a new feature to me, not a fix for an exploitable vulnerability13:21
SvenKieskeso if a custom insecure SG Rule is created, which might be okay for VM $foo or project $bar you could open up your env $x to unwanted network attention, at least that is my understanding.13:21
SvenKieskemhm, of course you could read it also as a new feature. not sure, that's why I'm asking here first :)13:22
fungiSvenKieske: also, the change you linked doesn't seem to update any documentation at all (not even a release note?), nor add any new options, it's just changing the behavior of the existing options. that's surprising13:23
SvenKieskeyeah, I was also wondering about that, but it's not my main opendev project, so I don't know about the standards there about breaking changes to defaults..*shrugs*13:24
SvenKieskeI agree I would have insisted on a reno there :)13:24
SvenKieskeI guess I'll ping artem13:25
SvenKieskedone that13:27
fungiso if you're asking whether a behavior change like that in a security-relevant part of a project deserves to be communicated to users, i feel like the answer is yes. but there are probably better ways to communicate this than trying to turn it into a security advisory about a vulnerability13:28

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!