[pve-devel] pve-firewall : datacenter drop/blacklist rules ?
Alexandre DERUMIER
aderumier at odiso.com
Tue Mar 25 11:29:11 CET 2014
>>That looks very specific, and not a general purpose setup.
>>Maybe we simply define 2 ipsets named 'Blacklist' and 'Whitelist'?
Yes, I think it's ok like this !
----- Mail original -----
De: "Dietmar Maurer" <dietmar at proxmox.com>
À: "Alexandre DERUMIER" <aderumier at odiso.com>, "pve-devel" <pve-devel at pve.proxmox.com>
Envoyé: Mardi 25 Mars 2014 05:58:04
Objet: RE: [pve-devel] pve-firewall : datacenter drop/blacklist rules ?
Hi Alexandre,
first, my plan is to rename 'groups.fw' to 'cluster.fw'. That new file can also
include a cluster wide 'rules' section, and we can add further sections
if needed.
> So, this avoid to parse all taps rules to finally drop (which can be cpu heavy, as
> the connection is never established, and each packet need to be dropped,
> again and again)
That is the purpose of the firewall.
> also maybe adding a list of authorized ports (in case of global ports scan
> attack, or if superadmin want to allowed only specific ports)
>
>
> What do you think about it ?
That looks very specific, and not a general purpose setup.
Maybe we simply define 2 ipsets named 'Blacklist' and 'Whitelist'?
> (BTW, I'm working on ipset feature, I'll send patches after ips will be finished)
Great. I am working on the API/GUI.
More information about the pve-devel
mailing list