By the way, we might want to add the same configuration to vmops for XenServer.

Currently it is possible to have a tenant vm send a router advertisement on the 
isolated lan that is picked up by XenServer. Even though XenServer only has a 
bridge interface in the tenant lan that interface will be autoconfigured. A 
simple ping to the local all-node address (ff02::1) will tell you the mac off 
of the XenServer interface. As XenServer has ssh active on all interfaces you 
can directly connect to the ssh daemon on the XenServer. We only push a IPv4 
firewall to the XenServer so the IPv6 firewall is default (ACCEPT everything).  

Still you only gain access to the ssh port, but that is something that should 
not be possible from a tenant lan.

Cheers,

Hugo

-----Original Message-----
From: Hugo Trippaers [mailto:htrippa...@schubergphilis.com] 
Sent: Monday, July 30, 2012 1:20 PM
To: cloudstack-dev@incubator.apache.org
Subject: Disable IPv6 for systemvm

Hey guys,

The current systemvm has IPv6 enabled including autoconfiguration. This means 
that if the machine is placed in an IPv6 enabled network (or somebody starts 
sending router advertisements) the VM's based on the system vm will 
autoconfigure the interface. This means a possible way to bypass the installed 
firewall as the IPv6 firewall is set to accept everything opposite to the IPv4 
firewall which is restricted.

My proposal is to include the following in sysctl.conf (at least until we 
properly support IPv6):
# Disable IPv6
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.all.forwarding = 0
net.ipv6.conf.all.accept_ra = 0
net.ipv6.conf.all.accept_redirects = 0
net.ipv6.conf.all.autoconf = 0

If no objections I would like to commit this change.

Cheers,

Hugo

Reply via email to