|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-API] XCP 1.5 antifspoofing rules
Good day.I've start to looking to XCP rules, applied with locked mode (antispoofing). I looking really strage. Here output of ovs-ofctl dump-flows xenbr1 for single vm with following settings on vif:
locking-mode ( RW): locked
ipv4-allowed (SRW): 31.186.98.19
ipv6-allowed (SRW): a100::ff00
ovs-ofctl dump-flows xenbr0|sort -k 8 -r
NXST_FLOW reply (xid=0x4):
cookie=0x0, duration=296.668s, table=0, n_packets=0, n_bytes=0,
priority=8000,udp,in_port=3,dl_src=a6:9a:38:42:e0:ae,tp_dst=67
actions=NORMAL
cookie=0x0, duration=296.654s, table=0, n_packets=0, n_bytes=0,
priority=7000,arp,in_port=3,dl_src=a6:9a:38:42:e0:ae,nw_src=0.0.0.0,arp_sha=a6:9a:38:42:e0:ae
actions=NORMAL
cookie=0x0, duration=296.641s, table=0, n_packets=0, n_bytes=0,
priority=7000,arp,in_port=3,dl_src=a6:9a:38:42:e0:ae,nw_src=31.186.98.19,arp_sha=a6:9a:38:42:e0:ae
actions=NORMAL
cookie=0x0, duration=296.628s, table=0, n_packets=0, n_bytes=0,
priority=6000,ip,in_port=3,dl_src=a6:9a:38:42:e0:ae,nw_src=31.186.98.19
actions=NORMAL
cookie=0x0, duration=296.615s, table=0, n_packets=0, n_bytes=0,
priority=8000,icmp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00,icmp_type=135,nd_sll=a6:9a:38:42:e0:ae
actions=NORMAL
cookie=0x0, duration=296.602s, table=0, n_packets=0, n_bytes=0,
priority=8000,icmp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00,icmp_type=136,nd_target=a100::ff00
actions=NORMAL
cookie=0x0, duration=296.589s, table=0, n_packets=0, n_bytes=0,
priority=5000,icmp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00
actions=NORMAL
cookie=0x0, duration=296.576s, table=0, n_packets=0, n_bytes=0,
priority=5000,tcp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00 actions=NORMAL
cookie=0x0, duration=296.563s, table=0, n_packets=0, n_bytes=0,
priority=5000,udp6,in_port=3,dl_src=a6:9a:38:42:e0:ae,ipv6_src=a100::ff00 actions=NORMAL
cookie=0x0, duration=296.55s, table=0, n_packets=0, n_bytes=0,
priority=7000,icmp6,in_port=3,icmp_type=135 actions=drop
cookie=0x0, duration=296.537s, table=0, n_packets=0, n_bytes=0,
priority=7000,icmp6,in_port=3,icmp_type=136 actions=drop
cookie=0x0, duration=296. 524s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=134 actions=drop
cookie=0x0, duration=296.512s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=137 actions=drop
cookie=0x0, duration=296.499s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=146 actions=drop
cookie=0x0, duration=296.48s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=151 actions=drop
cookie=0x0, duration=296.489s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=147 actions=drop
cookie=0x0, duration=296.472s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=152 actions=drop
cookie=0x0, duration=296.463s, table=0, n_packets=0, n_bytes=0,
priority=6000,icmp6,in_port=3,icmp_type=153 actions=drop
cookie=0x0, duration=296.455s, table=0, n_packets=0, n_bytes=0,
priority=4000,in_port=3 actions=drop
cookie=0x0, duration=1130.774s, table=0, n_packets=6198,
n_bytes=998970, priority=0 actions=NORMAL
Set of questions: 1) Why those strange 'icmp_type=X actions=drop' before 'drop all'? 2) Why ipv6 allows only tcp and udp? All other protocols are banned?3) Enabled by default udp for DHCP is not really good, because sender can fake source address and send DHCP requests outside network, allowing to use virtual machine to attack victim with faked source IP address. _______________________________________________ Xen-api mailing list Xen-api@xxxxxxxxxxxxx http://lists.xen.org/cgi-bin/mailman/listinfo/xen-api
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |