>>Yes, we also want to filter container to container traffic. 

Previously, we had a rule

-    # always allow traffic from containers?
-    ruleset_addrule($ruleset, "PVEFW-FORWARD", "-i venet0 -j RETURN");

so, it wasn't work at all before ?


I see this iptables traffic:
FORWARD: IN=venet0 OUT=venet0 SRC=10.3.94.204 DST=10.3.94.203 LEN=84 TOS=0x00 
PREC=0x00 TTL=64 ID=25368 PROTO=ICMP TYPE=0 CODE=0 ID=1751 SEQ=1

Maybe with some magic routing rule, is it possible to split to have to lines.
I'll check that today.


>>We should really have some regression tests, but I do not know a tool to 
>>simulate 
>>iptables? We can write a simple simulator ourselves, but that is much work 
>>:-/ 
Don't known too. I'll ask to my coworkers today.


----- Mail original ----- 

De: "Dietmar Maurer" <diet...@proxmox.com> 
À: "Alexandre DERUMIER" <aderum...@odiso.com> 
Cc: pve-devel@pve.proxmox.com 
Envoyé: Lundi 12 Mai 2014 06:16:37 
Objet: RE: venet firewall broken? 

> container to container ? 
> 
> venet0->venet0 ? 
> 

Yes, we also want to filter container to container traffic. 

> Damn, I don't have tested this case. 

We should really have some regression tests, but I do not know a tool to 
simulate 
iptables? We can write a simple simulator ourselves, but that is much work :-/ 
_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to