[ https://issues.apache.org/jira/browse/CLOUDSTACK-9027?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15346301#comment-15346301 ]
dsclose commented on CLOUDSTACK-9027: ------------------------------------- We've verified this on Cloudstack 4.8.0. To reproduce: 1. Create a network with a default egress ALLOW. 2. Add an egress rule to block traffic. Traffic type, source CIDR and port range is unimportant. 3. Restart the network with a clean-up. The result is a virtual router without the FW_EGRESS_RULES chain. The following rules are also missing from the filter table: {code}-A FW_EGRESS_RULES -j ACCEPT{code} This prevents any guest VM from initiating an outbound connection. Related/established traffic is fine. To resolve this situation we either manually add the above rule, or we remove any egress rules and restart the network with a clean-up. Of course, what this really means is that egress firewall rules as a feature are not functioning. > In the default egress allow network with existing egress rules to block > traffic, restarting the network breaks the egress rules > ------------------------------------------------------------------------------------------------------------------------------- > > Key: CLOUDSTACK-9027 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9027 > Project: CloudStack > Issue Type: Bug > Security Level: Public(Anyone can view this level - this is the > default.) > Affects Versions: 4.6.0 > Reporter: Rajani Karuturi > Assignee: Wilder Rodrigues > Priority: Critical > > This is found while testing PR #1023 > https://github.com/apache/cloudstack/pull/1023#issuecomment-153605360 > In the default egress allow network, it has an existing egress rule(created > earlier from egress tab on network page) to block port 22 and restarting it > created a new router without egress chain on the VR. > when I deleted the rule(from the egress tab on network page) and restarted > network, it created new router with egress chain properly configured in the > iptables. > to clear the confusion, I was able to reproduce it with the following steps > 1. create a new network with default egress allow (network name: > egress2_allow) > 2. launch a vm in the network. > 3. check that VR came up and running > 4. ssh to VR and check the iptables. > 5. verified that iptables FW_EGRESS_RULES chain is present and configured > properly. > 6. test outgoing traffic from user vm created in this network. (ssh and ping > were working fine) > 7. create a egress rule to block port 22 (from the egress rules tab on > networks page in UI) > 8. verified that iptables drop rule is added in FW_EGRESS_RULES chain on VR > 9. verified that ssh from user vm doesnt work > 10. restart network and wait till a new VR is created and running > 11. observe that FW_EGRESS_RULES chain is missing in the iptables on the new > VR > 12. also, ping google.com and ssh doesnt work from user vm -- This message was sent by Atlassian JIRA (v6.3.4#6332)