Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

connectivity: fix encryption validation with wireguard encap + host fw #2333

Merged

Conversation

giorio94
Copy link
Member

In Cilium v1.15 and later (as well as v1.14 if the --wireguard-encapsulate flag is set), when both tunnel encapsulation and WireGuard encryption are enabled, packets are first encapsulated and then encrypted. Let's fix the connectivity check inter-node interface determination when host firewall is additionally enabled, as currently always defaulting to the tunnel interface, which is incorrect (we would flag the packets as unencrypted, even though the encapsulated packets are encrypted afterwards).

In Cilium v1.15 and later (as well as v1.14 if the --wireguard-encapsulate
flag is set), when both tunnel encapsulation and WireGuard encryption are
enabled, packets are first encapsulated and then encrypted. Let's fix the
connectivity check inter-node interface determination when host firewall
is additionally enabled, as currently always defaulting to the tunnel
interface, which is incorrect (we would flag the packets as unencrypted,
even though the encapsulated packets are encrypted afterwards).

Signed-off-by: Marco Iorio <marco.iorio@isovalent.com>
Copy link
Member

@brb brb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

@maintainer-s-little-helper maintainer-s-little-helper bot added the ready-to-merge This PR has passed all tests and received consensus from code owners to merge. label Feb 27, 2024
@brb brb merged commit 7c18241 into cilium:main Feb 27, 2024
13 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ready-to-merge This PR has passed all tests and received consensus from code owners to merge.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants