[pve-devel] hetzner bug with pve-firewall
Fabian Grünbichler
f.gruenbichler at proxmox.com
Fri Sep 10 12:43:28 CEST 2021
On September 10, 2021 12:31 pm, alexandre derumier wrote:
> Hi,
>
> multiple users have reported problems with hetzner in bridged mode this
> week and pve-firewall
> https://forum.proxmox.com/threads/proxmox-claiming-mac-address.52601/
> https://forum.proxmox.com/threads/mac-address-abuse-report.95656/
>
> Seem that hetzner have bugs or are under attack, but they are flooding
> traffic to proxmox nodes with wrong mac/ip destination.
>
> The problem is that if users use pve-firewall with reject rules, the
> RST packet is send with the wrong mac/ip as source,
>
> and then hertzner is blocking the server of the users ....
>
>
> I'm looking to see if we could add filtering at ebtables level, to drop
> wrong mac destination.
>
> But they are also another problem, if user use DROP as default action,
> we have a default REJECT for whois port 53.
>
> 'PVEFW-Drop' => [
> # same as shorewall 'Drop', which is equal to DROP,
> # but REJECT/DROP some packages to reduce logging,
> # and ACCEPT critical ICMP types
> { action => 'PVEFW-reject', proto => 'tcp', dport => '43' }, #
> REJECT 'auth'
>
> Does somebody known why we do a reject here ? could it be change to
> drop ?
https://git.proxmox.com/?p=pve-firewall.git;a=commit;h=d9e7522b561ceb323e93affb29c9fced89fed967
would just require a bump + upload
More information about the pve-devel
mailing list