Security Groups do not prevent MAC spoofing with non-IP traffic
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
New
|
Undecided
|
Unassigned |
Bug Description
The IptablesFirewal
If L2population is not used, an instance can spoof the Neutron router's MAC address and cause the switches to learn a MAC move, allowing the instance to intercept other instances traffic potentially belonging to other tenants if this is shared network.
A solution for this is to use ebtables restrict the source MAC address from frames accepted from the instance to MAC addresses assigned to the Neutron port. Using a rule such as this:
-i tap29f34cfc-a7 --among-src ! fa:16:3e:e0:b1:ba, -j DROP
Should be sufficient, and allow removing MAC address verification within iptables and ip6tables rules managed by Neutron.
information type: | Private Security → Public |
Marking as duplicate because the other bug is a result of the same non-enforcement of MACs.