Hi Wei,

Thanks for your response. Advanced zone is being used with a guest network
type "shared". Disclaimer, I neither setup nor configured this
cloustack zone or instance. How can I tell if security groups were enabled
when the zone was created? At this point, I am leaning towards they
weren't, but need to confirm.

Regards,

Willard

On Mon, May 22, 2023 at 8:40 AM Wei ZHOU <ustcweiz...@gmail.com> wrote:

> Hi Will,
>
> What type of zone and network do you use ?
>
> As said before, the functionality works in the Advanced zones with security
> groups (as well as the Basic zones).
> If you use the advanced zone and isolated networks (it seems so), there is
> no such functionality, as far as I know.
>
> -Wei
>
>
> On Mon, 22 May 2023 at 14:00, Will Conrad <wcon...@hivelocity.net.invalid>
> wrote:
>
> > Thank you everyone, for your responses.
> >
> > I feel the need to further clarify my question:
> > The spoofing and IP theft this thread is concerned with is related to bad
> > actors on cloudstack instances attempting to send out traffic as a
> > different IP or attempting to utilize network IPs that aren't/weren't
> > assigned to said VM by cloudstack.
> >
> > Based on some of the responses and a jira ticket from an old cloudstack
> > version: https://issues.apache.org/jira/browse/CLOUDSTACK-8559
> > I thought I would confirm that the spoofing and IP theft I am immediately
> > concerned with would not be an issue. However, I find that I am able to
> > manually modify an instance IP (from within the instance) and maintain
> > connectivity using the modified IP after removing the original
> > cloudstack-assigned IP.
> >
> > Method of modification was using iproute2 tools from within the VM: ip
> addr
> > add ..., ip addr del ..., ip route add ...
> >
> > Example: created new instance, received cloudstack assigned public IP,
> > confirmed working. Logged into instance, manually added "stolen" IP,
> > manually removed cloudstack assigned IP, re-added default gateway, tested
> > connectivity. Instance was able to communicate on the internet by both
> > sending and receiving outbound pings, performing DNS resolution, and
> > accepting inbound ssh connects via the new manually added IP.
> >
> > This is contradictory to what I expected. Does something have to be done
> to
> > enable this anti-spoofing functionality? Are there details I am missing?
> >
> > Regards,
> >
> > Willard Conrad
> > DevOps Engineer
> > Hivelocity, LLC
> >
> >
> >
> > On Thu, May 18, 2023 at 11:07 AM Wei ZHOU <ustcweiz...@gmail.com> wrote:
> >
> > > Yes, as Jithin said cloudstack uses iptables/ebtables/ipset to prevent
> IP
> > > spoofing in advanced zone with security groups.
> > >
> > > If the IP or mac address of vm instance is modified inside the vm by
> the
> > > user, the vm will not work.
> > >
> > > -Wei
> > >
> > >
> > > On Thursday, 18 May 2023, Jithin Raju <jithin.r...@shapeblue.com>
> wrote:
> > >
> > > > Hi Willard,
> > > >
> > > > I believe there is something implemented using iptables,ebtables to
> > > > prevent IP spoofing for security group enabled zones. You need to
> take
> > > this
> > > > into account if you are using security group enabled zones.
> > > >
> > > > -Jithin
> > > >
> > > > From: Will Conrad <wcon...@hivelocity.net.INVALID>
> > > > Date: Thursday, 18 May 2023 at 1:08 PM
> > > > To: users@cloudstack.apache.org <users@cloudstack.apache.org>
> > > > Subject: IP Spoofing and IP Theft
> > > > Hello Community!
> > > >
> > > > It looks like cloudstack has built-iin protection to prevent IP
> > > spoofing, I
> > > > am wondering what kind (if any) of protections cloudstack has
> built-in
> > to
> > > > protect the environment from IP theft, or is this a consideration
> that
> > > > should be taken into account when designing the network layout and
> > > > offerings for tenants?
> > > >
> > > > Regards,
> > > >
> > > > Willard Conrad
> > > > DevOps Engineer
> > > > Hivelocity, LLC
> > > >
> > > >
> > > >
> > > >
> > >
> >
>

Reply via email to