Good day.
I've start to looking to XCP rules, applied with locked mode
(antispoofing). I looking really strage.
Here output of ovs-ofctl dump-flows xenbr1 for single vm with following
settings on vif:
locking-mode ( RW): locked
ipv4-allowed (SRW): 31.186.98.19
ipv6-allowed (SRW): a100::ff00
ovs-ofctl dump-flows xenbr0|sort -k 8 -r
NXST_FLOW reply (xid=0x4):
cookie=0x0, duration=296.668s, table=0, n_packets=0, n_bytes=0,
priority=8000,udp,in_port=3,dl_src=a6:9a:38:42:e0:ae,tp_dst=67
actions=NORMAL
cookie=0x0, duration=296.654s, table=0, n_packets=0, n_bytes=0,
priority=7000,arp,in_port=3,dl_src=a6:9a:38:42:e0:ae,nw_src=0.0.0.0,arp_sha=a6:9a:38:42:e0:ae
actions=NORMAL
cookie=0x0, duration=296.641s, table=0, n_packets=0, n_bytes=0,
priority=7000,arp,in_port=3,dl_src=a6:9a:38:42:e0:ae,nw_src=31.186.98.19,arp_sha=a6:9a:38:42:e0:ae
actions=NORMAL
cookie=0x0, duration=296.628s, table=0, n_packets=0, n_bytes=0,
priority=6000,ip,in_port=3,dl_src=a6:9a:38:42:e0:ae,nw_src=31.186.98.19
actions=NORMAL
cookie=0x0, duration=296.615s, table=0, n_packets=0, n_bytes=0,
priority=8000,icmp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00,icmp_type=135,nd_sll=a6:9a:38:42:e0:ae
actions=NORMAL
cookie=0x0, duration=296.602s, table=0, n_packets=0, n_bytes=0,
priority=8000,icmp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00,icmp_type=136,nd_target=a100::ff00
actions=NORMAL
cookie=0x0, duration=296.589s, table=0, n_packets=0, n_bytes=0,
priority=5000,icmp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00
actions=NORMAL
cookie=0x0, duration=296.576s, table=0, n_packets=0, n_bytes=0,
priority=5000,tcp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00 actions=NORMAL
cookie=0x0, duration=296.563s, table=0, n_packets=0, n_bytes=0,
priority=5000,udp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00 actions=NORMAL
cookie=0x0, duration=296.55s, table=0, n_packets=0, n_bytes=0,
priority=7000,icmp6,in_port=3,icmp_type=135 actions=drop
cookie=0x0, duration=296.537s, table=0, n_packets=0, n_bytes=0,
priority=7000,icmp6,in_port=3,icmp_type=136 actions=drop
cookie=0x0, duration=296. 524s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=134 actions=drop
cookie=0x0, duration=296.512s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=137 actions=drop
cookie=0x0, duration=296.499s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=146 actions=drop
cookie=0x0, duration=296.48s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=151 actions=drop
cookie=0x0, duration=296.489s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=147 actions=drop
cookie=0x0, duration=296.472s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=152 actions=drop
cookie=0x0, duration=296.463s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=153 actions=drop
cookie=0x0, duration=296.455s, table=0, n_packets=0, n_bytes=0,
priority=4000,in_port=3 actions=drop
cookie=0x0, duration=1130.774s, table=0, n_packets=6198,
n_bytes=998970, priority=0 actions=NORMAL
Set of questions:
1) Why those strange 'icmp_type=X actions=drop' before 'drop all'?
2) Why ipv6 allows only tcp and udp? All other protocols are banned?
3) Enabled by default udp for DHCP is not really good, because sender
can fake source address and send DHCP requests outside network, allowing
to use virtual machine to attack victim with faked source IP address.
_______________________________________________
Xen-api mailing list
[email protected]
http://lists.xen.org/cgi-bin/mailman/listinfo/xen-api