Skip to content

Commit

Permalink
Add implementation note for networking rbac restriction
Browse files Browse the repository at this point in the history
Signed-off-by: Konrad Gube <[email protected]>
  • Loading branch information
kgube committed Nov 21, 2024
1 parent cc2286c commit fa27398
Show file tree
Hide file tree
Showing 2 changed files with 22 additions and 2 deletions.
3 changes: 1 addition & 2 deletions Standards/scs-xxxx-v1-provider-network-standard.md
Original file line number Diff line number Diff line change
Expand Up @@ -236,7 +236,7 @@ If such a subnet pool is provided, it **MUST** have the `is_default` flag set to
### RBAC Restrictions

By default, users **SHOULD** be prohibited by policy from creating Networking RBAC rules, to prevent the creation of faux provider networks.
The necessary policy change to implement this restriction for the Neutron API can be found in the Networking RBAC documentation [^rbac].
The necessary policy change is described in the implementation notes to this standard.

## Conformance Tests

Expand All @@ -250,4 +250,3 @@ The necessary policy change to implement this restriction for the Neutron API ca
[^pf]: <https://docs.openstack.org/api-ref/network/v2/index.html#floating-ips-port-forwarding>
[^ds]: <https://docs.openstack.org/neutron/2024.1/admin/config-ipv6.html>
[^aa]: <https://docs.openstack.org/neutron/2024.1/admin/config-auto-allocation.html>
[^rbac]: <https://docs.openstack.org/neutron/2024.1/admin/config-rbac.html#preventing-regular-users-from-sharing-objects-with-each-other>
21 changes: 21 additions & 0 deletions Standards/scs-xxxx-w1-provider-network-standard-implementation.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
title: "Provider Network Standard: Implementation Notes"
type: Supplement
track: IaaS
status: Proposal
supplements:
- scs-xxxx-v1-provider-network-standard.md
---

### Policy adjustment for restricting Networking RBAC

Per default, OpenStack's Networking API allows all user, regardless of role to change the accessibility of networking resources (e.g. networks, routers, security groups) to other projects.
Such shared resources are, without knowledge of the respective project IDs, indistinguishable from resources shared by the CSP, allowing malicious users to present networking resources to other client as coming from the provider.
The Provider Network Standard states that CSPs SHOULD restrict this functionality to administrators, which requires the following change to the `policy.yaml` file of the Neutron API[^rbac]:

```yaml
"create_rbac_policy": "rule:admin_only"
```
[^rbac]: <https://docs.openstack.org/neutron/2024.1/admin/config-rbac.html#preventing-regular-users-from-sharing-objects-with-each-other>

0 comments on commit fa27398

Please sign in to comment.