In the current ACL implementation, the drop action is impacted by
conntrack behavior, leading to some unexpected results. Here is a
specific scenario we’ve encountered:

Topology:
    VM-1(Logical Switch Port) -------- LS1(Logical Switch)
--------Router-Interface(Logical Switch Port, type=router)
-------Router(Logical  Router)-----External Network

ACL rules:
  VM-1:
              from-lport  2000 (inport == @pg_vm && ip4)  allow-related
              to-lport      2000 (outport == @pg_vm && ip4)  allow-related
  Router-Interface:
              from-lport  2000 (inport == @pg_interface && ip4) drop
              to-lport      2000 (outport == @pg_interface && ip4)
allow-stateless

The expected outcome was for the VM-1 traffic to be blocked because
the reply should be denied by the drop ACL on the Router-Interface.
However, in testing, we observed that traffic from the LSP still
passes as if unaffected by the drop rule.

After analyzing the flow tables, we found that once conntrack has
established a connection for a packet within a logical switch
pipeline, it allows reply packets by default, bypassing the configured
drop rule. This means that drop rules applied on router ports are
impacted by conntrack if there are stateful rules within the same
logical switch.

To address this, we propose introducing a new drop action, tentatively
named drop-stateless, that would handle packets requiring a drop
action before they reach the stateful processing stage. This would
prevent these packets from being affected by any stateful rules in
place.

Below is the code I’ve hardcoded to test this approach:

diff --git a/northd/northd.c b/northd/northd.c
index 3037ce0b5..528505b9e 100644
--- a/northd/northd.c
+++ b/northd/northd.c
@@ -6031,7 +6031,12 @@ build_stateless_filter(const struct ovn_datapath *od,
                        struct lflow_table *lflows,
                        struct lflow_ref *lflow_ref)
 {
-    const char *action = REGBIT_ACL_STATELESS" = 1; next;";
+    const char *action = NULL;
+    if (!strcmp(acl->action, "allow-stateless")) {
+        action = REGBIT_ACL_STATELESS" = 1; next;";
+    } else if (!strcmp(acl->action, "drop-stateless")) {
+        action = "drop;";
+    }
     if (!strcmp(acl->direction, "from-lport")) {
         ovn_lflow_add_with_hint(lflows, od, S_SWITCH_IN_PRE_ACL,
                                 acl->priority + OVN_ACL_PRI_OFFSET,
@@ -6057,7 +6062,8 @@ build_stateless_filters(const struct ovn_datapath *od,
 {
     for (size_t i = 0; i < od->nbs->n_acls; i++) {
         const struct nbrec_acl *acl = od->nbs->acls[i];
-        if (!strcmp(acl->action, "allow-stateless")) {
+        if (!strcmp(acl->action, "allow-stateless") ||
+            !strcmp(acl->action, "drop-stateless")) {
             build_stateless_filter(od, acl, lflows, lflow_ref);
         }
     }
@@ -6073,7 +6079,8 @@ build_stateless_filters(const struct ovn_datapath *od,
         for (size_t i = 0; i < ls_pg_rec->nb_pg->n_acls; i++) {
             const struct nbrec_acl *acl = ls_pg_rec->nb_pg->acls[i];

-            if (!strcmp(acl->action, "allow-stateless")) {
+            if (!strcmp(acl->action, "allow-stateless") ||
+                !strcmp(acl->action, "drop-stateless")) {
                 build_stateless_filter(od, acl, lflows, lflow_ref);
             }
         }

Looking forward to your feedback and suggestions.

Best regards,
Liushy
_______________________________________________
discuss mailing list
disc...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss

Reply via email to