Thanks for explain Jeremy! Very clear.

I think systems with cloud-init enabled, like most images, can be easily 
configured to disable this feature. 

Thank you!
:) 

> On 28 Sep 2017, at 21:37, Jeremy Stanley <fu...@yuggoth.org> wrote:
> 
> On 2017-09-28 20:29:38 -0300 (-0300), Jorge Luiz Correa wrote:
>> It would be good if developers could know about that because
>> privacy extension is becoming the default on every operate
>> systems. I've tested last version of *ubuntu and some FreeBSD
>> kernels, all operating with privacy extension by default.
>> 
>> So, this way of creating the iptables rules need to be reviewed.
> [...]
> 
> To accommodate privacy extensions, we'd basically have to give up on
> any assumptions as to what the viable source addresses originating
> on a port could be (at least within the netmask). This filtering is
> the primary mechanism for preventing address spoofing within a
> shared network.
> 
> By comparison, RFC 4941 privacy extensions are primarily a
> protection for desktop/mobile client systems and do little (if
> anything) useful for a statically-addressed server. Disabling it
> there makes a lot of sense to me, as a privacy/security-conscious
> sysadmin.
> -- 
> Jeremy Stanley
> _______________________________________________
> Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
> Post to     : openstack@lists.openstack.org
> Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack


_______________________________________________
Mailing list: http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack
Post to     : openstack@lists.openstack.org
Unsubscribe : http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack

Reply via email to