Re: ebtables and anti-spoofing rules not working 100%?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Tomasz Chmielewski a écrit :
> On 29.08.2010 17:28, Pascal Hambourg wrote:
> 
>>> # guest communication with the gateway
>>> ebtables -A INPUT -i vmtab107i0 -j vm107
>>> ebtables -A OUTPUT -o vmtab107i0 -j vm107
>> Do you need to prevent spoofing by the host itself ?
> 
> Host is "trusted", so it doesn't need any additional measures.
> Guests, on the other hand, are to be "untrusted".

Then filtering in OUTPUT is unnecessary.

>>> What anti-spoofing rules I need to have to prevent some kvm guests
>>> pretending to be other kvm guests (or, even pretending to be "gateways")?
>>
>> Just create rules called from INPUT and FORWARD which match the input
>> interface (bridge port) and the MAC and IP source address.
>>
>> ebtables -A INPUT -i vmtab107i0 -j vm107
>> ebtables -A FORWARD -i vmtab107i0 -j vm107
>>
>> ebtables -A vm107 -p IPv4 -s 11:22:33:44:55:66 --ip-src 1.2.3.4 \
>>    -j ACCEPT
>> ebtables -A vm107 -p ARP -s 11:22:33:44:55:66 \
>>    --arp-mac-src 11:22:33:44:55:66 --arp-ip-src 1.2.3.4 -j ACCEPT
> 
> With these rules, I'm not able to communicate (i.e. ping) with other 
> hosts in the same subnet, except the gateway (although this was the same 
> with my previous rules, I think).

Of course these rules are just a part of the ruleset. Did you do the
same for all other bridge ports and hosts in the subnet ?
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux