-
Notifications
You must be signed in to change notification settings - Fork 748
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a high priority rule to handle link-local traffic via local route table in SGPP Mode for both IPV4 and IPV6. #3148
base: master
Are you sure you want to change the base?
Conversation
…r both IPV4 and IPV6.
One comment on adding high priority rule is, this changes changes the definition strict mode, and makes communication possible which wasn't previously, by definition. We introduced We need to evaluate this if this change is required at all. |
This statement specifically I'm not sure is true:
Or rather, it's moot ATM because It was suggested that instead of doing what this PR does, explicitly allowlisting link-local CIDRs in SGs would work - but this does not appear to work, the LL packets don't even make it all the way to the ENI for proper enforcement with So this is still a basic |
Allowing link-local traffic will require more changes than this PR. That brought in the changes that is almost close the introduction of standard mode that was introduced - #1907 - So, the |
Yes, using It's not a security concern either - the fundamental problem (I believe) is that link-local traffic cannot make it far enough for SGPP enforcement to apply to it in the first place, so there is nothing to assert policy against either way. |
Today, under the strict mode, we can apply security group rules to allow host process access to pod health check pod. Drop link local prevent us from doing that. |
What type of PR is this?
bug-fix
Which issue does this PR fix?:
#2797
What does this PR do / Why do we need it?:
When POD_SECURITY_GROUP_ENFORCING_MODE is set to strict, pods with SGPP configured have their traffic routed over a branch ENI and thus entirely bypass the primary interface on the node.
Thus pods with SGPP strict mode, will fail to reach link-local addresses. This change ensures that when SGPP is configured in the strict mode, the link-local traffic goes through local route table. This is similar to how ICMPv6 packets from the gateway is handled currently for strict mode.
Testing Information
before this change - the nodes in EKS cluster with SGPP=strict will have the route table.
after this this change.
169.254.0.0/16 to 169.254.0.0/16
is added by this change.