Don't forget incoming ones. Of course this basically works, but I think
the method is not as good:
Filtering a bridge is:
Send the traffic everywhere, but drop it with iptables/ebtables
anywhere, where it should not go. This leaves you with a 90% or more
drop rate (performance issue).
Routing is:
Send the the traffic where it should go, and control with iptables,
that it really only goes there and no ip spoofing is happening. As long
as no one is doing something evil, you wont have any dropped packages
(and much less invocations of your iptables chains).
Both is possible, and none is secure by default, but I personally think
that routing is better for servers, bridging better for LANs (because
of broadcasts / DHCP).
Am 18.06.2010 15:14, schrieb Jonathan Tripathy:
Is securing a bridge not just a matter of using
ebtables to say that all traffic going out vi ana interface must be
destined for a paticular MAC address?
Hello,
I suggest you to use *always* routing with VPS hosting.
First reason:
Routing only sends packages to the destination host, not to all hosts.
Second:
Routing is faster and easier to filter with iptables.
Only disadvantage:
You cant route broadcasts across multiple VMs, but you won't want that
anyway, because this is only for LAN situation and your VPS may rather
consider themselves as part of the internet, not part of a LAN.
But this does mean that you need to change your whole network setup:
- Switch the vif-script to a routing one, especially with firewalling
and static mac addresses (to prevent ARP-based attacks)
- Setup iptables in the Dom0 to disallow ARP-, MAC- or IP-Spoofing and
to deny ICMP redirect packages (and probably some other ICMPs, too).
You can secure a bridge, too, but this is harder and not as efficient as
routing.
Regards,
Felix Kuperjans
Am 18.06.2010 14:51, schrieb Jingyun He:
> Hello,
> I have xen node, it has a few VPSes, it used bridge network mode,
and
> we noticed that if one vps is restarted or a new vps is started,
the
> bridge will send all traffic to all interface during a few seconds,
> and I did run a sniff program in one vps, it successful restrived
some
> password with these traffic.
>
> Any solution?
>
> Thanks.
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-users
>
>
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|