|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] [SECURITY] preventing Hwaddr spoofing on bridge
RafaÅ Kupka wrote: Hi,This is great stuff, thanks a lot I was looking to spend some time on ebtables to solve these spoofing issues, I will try it and let you know if I find any problems I use aoe and even though it use mac filtering on its own I still believe Xen had some security issues un dealt with. Your correspondance seems to indicate its the case. Best Regards, On Sun, Nov 25, 2007 at 07:50:23AM +0000, Andy Smith wrote:On Sun, Nov 25, 2007 at 02:53:04AM +0100, Stefan de Konink wrote:Hi,I see your point. I hadn't thought of that problem before. I have done some preliminary testing with ebtables and the following seems to work: ebtables -t nat -A PREROUTING -i some-vif -s ! aa:00:00:6a:38:0c --log-level debug --log-prefix 'SPOOF:' -j DROPSo, I think this may be what is required. I will keep the rule in place for my test domains for a while just to check that it doesn't get triggered incorrectly. Can you still find a way to break it after using this method?You can still impersonate other domUs IP addresses. Rooted domUs may send spoofed arp replies with MAC address that belong to them. It's especially easy when you shut down some domain for management -- other one can steal its IP address. With both domUs live attack is harder but still possible (race with arp-reply delivery). My solution: Always put mac and IPs in config file like this:vif = [ 'ip=192.168.1.2 192.168.1.3, script=vif-bridge, -- Steven Dugway _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |