[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] XCP Xen Cloud Control System ver 0.3 released!
On 2010-05-25, at 3:15 PM, "Iustin Pop" <iusty@xxxxxxxxx> wrote: On Tue, May 25, 2010 at 10:04:26AM -0400, Vern Burke wrote:I only do static IP assignments on the VMs. I have no idea how you'd stop a VM from running a DHCP server from outside the VM (not that I can imagine why anyone would want to do that anyways). The best answer I've found for a lot of shennanigans is a zero tolerance policy in the terms of service (do it and you're gone, period).From http://en.wikipedia.org/wiki/DHCP: "DHCP uses the same two ports assignedby IANA for BOOTP: 67/udp for sending data to the server, and 68/udp for datato the client."You could simply filter packets on port 67/udp towards the VM, so it doesn't see the requests, and on port 68/udp from the VM, so it's not able to reply.regards, iustin _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users The original question was that a VM's IP is configured by a DHCP server and the concern was that they did not want a rogue DHCP server to cause problems. So if the solution is to use iptables, you can not just block udp ports, but you would have to have pass rules from the legitate IP addresses. Using ebtables may also help for link-layer protocols. It's always good practice to know the communications and data flows in your environment. Testing for rogue servers doing dhcp is a good idea, especially with wireless and vm environments. Passing data to an unexpected default gateway would not be good so making sure no one is passing themselves off as the default gateway is another step. Frank _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |