On 11/15/24 14:13, Stefan Hanreich wrote:
> I see two ways of solving this problem:
> 
> * We introduce a knob at VM level that lets you decide whether to drop
> ct invalid traffic or not. (Invalid traffic would then still be
> evaluated by the firewall rules if it's allowed in principle, as is the
> case on host-level)
> 
> * We apply the host-level setting to VMs as well.

The old firewall does it like this - so maybe we should do it here as well:

* drop invalid traffic in PVEFW-HOST-IN (= INPUT chain) irregardless
  of the setting
* drop invalid traffic on PVEFW-FORWARD (= FORWARD chain) if
  allow_invalid is 0 (= default)

It's important not to accept it immediately, because then the rest of
the ruleset still gets evaluated, mitigating the blast radius of this
setting considerably.


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to