Hello,

I have Identified a security bug at the DC firewall level where firewall rules 
are bypassed. I am concerned that this could be a zero day vulnerability.  
Based on the conditions below, any security group, in this case sg_pbs_stor_pbs 
is an empty group with NO rules, will hijack the traffic flow and stop FW 
filtering. If the drop rule was placed above security groups then it worked as 
expected. My test was pinging my host from a VM, the drop rule should have 
stopped the ping but if the vm was on the same host, the ping was acknowledged


This happens in a very specific scenario, the conditions to recreate are:

  1.  VM Must be running on its Host, this does not affect VM running on a 
different host.
  2.  A vlan based vnet is created and tagged
  3.  The host gets a static IP on the vnet
  4.  Default Input Policy: Drop

nano /etc/pve/firewall/cluster.fw
[group sg_pbs_stor_pbs] # PBS Rules  #<-Empty Group, no rules

[RULES]

GROUP sg_pbs_stor_pbs -i vmbr1.2 #<-This will steal the traffic flow and 
processing will stop
IN DROP -i inf0nas -log nolog #<- it never makes it here

/etc/network/interfaces.d/sdn
auto inf0nas
iface inf0nas
        bridge_ports vmbr1.14
        bridge_stp off
        bridge_fd 0
        mtu 9000
        alias NAS

/etc/network/interfaces
auto vmbr1
iface vmbr1 inet manual
    bridge-ports enp12s0f0np0
    bridge-stp off
    bridge-fd 0
    bridge-vlan-aware yes
    bridge-vids 1-100
    mtu 9000

auto inf0nas   #<- notice the use of a vnet
iface inf0nas inet static
    address 10.32.14.111/24
    mtu 9000


Thanks,
W3Net Admin


Reply via email to