On 12/06/2011 01:33 PM, Justin Pettit wrote:
On Nov 13, 2011, at 8:38 PM, David Erickson wrote:

On 11/1/2011 1:36 PM, Ben Pfaff wrote:
On Fri, Sep 09, 2011 at 12:11:11PM -0700, Ben Pfaff wrote:
Justin, you've also experienced the pain of in-band control.  Would
you mind reviewing David's analysis?
Justin, did you ever get a chance to look this over?


Just following up with an attached patch, I've been using it for a couple 
months now in an environment with 80 OVS instances where the controller is 
behind a gateway.  I've had no problems associated with this patch and have 
gained increased ARP visibility at the controller.

Wow, I'm really sorry that this has been outstanding for so long.

I've looked at your patch, and I'm concerned that it actually has the effect of 
broadening the traffic that is allowed.  I believe your issue with the current 
implementation is that it is not possible to define policies over the OpenFlow switch's 
ARP traffic.  This is a  fair criticism.  However, I think your proposed patch (in 
combination with existing rules (f) and (g)) would allow all ARP traffic to or from 
"remote", which is either a controller or gateway.  This means that it would be 
impossible to write ARP-related flows that limit a random host's ability to ARP those 
devices.  I'd think the ability to do this would be preferable over controlling the 
(hopefully) trusted switch's traffic.  Do you agree with my analysis?

--Justin

Thanks Justin-
I do agree with your analysis in that it is narrowing some traffic but actually broadening it for ARPs to/from a remote. I think we can actually solve both problems by unioning the existing b/c rule with my proposed b*/c* rule ie:

(b**) ARP replies to the local port's MAC address containing the remote's IP as a source (c**) ARP requests from the local port's MAC address containing the remote's IP as a target

This should still allow rules to be written to handle ARP replies from a remote as long as they aren't going to the local MAC, and ARP requests to a remote as long as they aren't from the local port. It also will *not* catch ARP requests coming from the local port to *non* remote targets, and similarly for ARP replies coming back to the local port from non remote targets.

Thoughts?

-David
_______________________________________________
discuss mailing list
discuss@openvswitch.org
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to