On Tue, Apr 27, 2010 at 6:33 PM, Todd Deshane <desha...@gmail.com> wrote:

> On Tue, Apr 27, 2010 at 9:20 PM, Jesse Gross <je...@nicira.com> wrote:
> > On Tue, Apr 27, 2010 at 7:37 AM, George Shuklin <n...@narod.ru> wrote:
> >>
> >> Good day.
> >>
> >> Is any way to filter with ovs VM's traffic (like mac spoofing or ip
> >> usurpation)?
> >>
> >> I was tried to find any, but found none.
> >
> > There isn't currently a specific MAC/IP anti-spoofing feature.  You can,
> > however, add flow entries that allows traffic from a given port, MAC, and
> IP
> > and drops everything else.  The ovs-ofctl man page describes how to add
> > flows.
>
> An explicit feature isn't really necessary though given those three right?
>

This covers most of the problem.  The one weakness is with ARP, which
contains MAC addresses inside the payload that it is not currently possible
to match on.  We are considering an explicit feature to deal with this issue
but it hasn't been implemented yet.


> An attacker with root on a VM can fake a MAC and IP, but they can't
> plug the VM into a different vswitch port...
>
> I guess a database feature could be added that makes it so the three
> must be bound in order for flows not to get dropped. But I guess that
> would be more important with migration of VMs and then it gets into
> a more sophisticated controller like NOX probably right?


Right, in general we prefer make the controller deal with this type of issue
where possible.
_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss_openvswitch.org

Reply via email to