[pve-devel] [PATCH V2 pve-firewall] add cluster ebtables_dst_macfilter option.
DERUMIER, Alexandre
Alexandre.DERUMIER at groupe-cyllene.com
Fri Mar 18 19:59:05 CET 2022
Hi Wolfgang,
I think we don't need this patch, now that bridge disabling learning
patch has been applied
https://git.proxmox.com/?p=pve-common.git;a=commit;h=354ec8dee37d481ebae49b488349a8e932dce736
(The problem with hetzner was unicast flood to all ports, and iptables
reject replied with fwbr mac).
(I'll do more tests on nftables next week. I think that I'm currently
able to do nat/routing/ bridging with in/out direction with only 1
extra bridge but I need to do more tests to be sure)
Le vendredi 18 mars 2022 à 14:26 +0100, Wolfgang Bumiller a écrit :
> Sorry for the late reply.
>
> On Fri, Sep 10, 2021 at 05:34:29PM +0200, Alexandre Derumier wrote:
> > This new option allow filtering of destination macs for ingress
> > traffic.
> >
> > This is a protection from bad/hosting networks (like hetzner)
> > flooding
> > traffic with non-hosted mac.
> >
> > To be fast, one rule, this use the "--among-dst mac,mac,mac,mac,"
> > syntax.
> > broadcast mac ff:ff:ff:ff:ff:ff is always allowed
> >
> > currently, ebtables-restore segfault if too many are defined
> > https://antiphishing.cetsi.fr/proxy/v3?i=SGI0YVJGNmxZNE90Z2thMFYLWS
> > xJOfIERJocpmb73Vs&r=SW5LV3JodE9QZkRVZ3JEYaKhfBhKBzRXSL89azwXC1T82d4
> > SHYTQZhKJK2pOWOed&f=bnJjU3hQT3pQSmNQZVE3aPZk7pd95tMIq-
> > 3WY1DAs1r9IrKi7Hir7rLvpxC8B0uY&u=https%3A//www.spinics.net/lists/ne
> > tfilter/msg55995.html&k=dFBm
> >
> > So, I'm using "--among-dst-file", loading macs from an external
> > file.
>
> It's a little awkward but works, I guess, however, it does mess with
> the
> digests we use to verify the ruleset and therefore keeps logging
> errors
> in syslog. This will need fixing.
>
> How many entries can you have before this starts happening anyway?
> And how many entries do you expect there to be?
>
> > Note that "ebtables-save" still show the syntax with "--among-dst
> > mac,mac,mac,"
> > (with a comma at the end), so I compile the full mac list with --
> > among-dst to
> > compare, and if update is needed, I'm writing the dst file in
> > /var/lib/pve-firewall/chain-macfilter, and replace among-dst syntax
> > by among-dst-file
> >
> > Changelog v2:
> > - as we use one rule for performance, add all vms/ct macaddress
> > when vm firewall is enabled.
> > (even if vm macfilter option is disabled).
> >
> > Signed-off-by: Alexandre Derumier <aderumier at odiso.com>
> > ---
> > src/PVE/Firewall.pm | 40 ++++++++++++++++++++++++++++++++++++----
> > 1 file changed, 36 insertions(+), 4 deletions(-)
> >
> > diff --git a/src/PVE/Firewall.pm b/src/PVE/Firewall.pm
> > index edc5336..8277ee0 100644
> > --- a/src/PVE/Firewall.pm
> > +++ b/src/PVE/Firewall.pm
> > @@ -1221,6 +1221,11 @@ our $cluster_option_properties = {
> > default => 1,
> > optional => 1,
> > },
> > + ebtables_dst_macfilter => {
> > + description => "Filtering VM/CT destination mac for ingress
> > traffic.",
> > + type => 'boolean',
> > + optional => 1,
> > + },
> > policy_in => {
> > description => "Input policy.",
> > type => 'string',
> > @@ -2867,7 +2872,7 @@ sub parse_clusterfw_option {
> > if (($value > 1) && ((time() - $value) > 60)) {
> > $value = 0
> > }
> > - } elsif ($line =~ m/^(ebtables):\s*(0|1)\s*$/i) {
> > + } elsif ($line =~
> > m/^(ebtables|ebtables_dst_macfilter):\s*(0|1)\s*$/i) {
> > $opt = lc($1);
> > $value = int($2);
> > } elsif ($line =~
> > m/^(policy_(in|out)):\s*(ACCEPT|DROP|REJECT)\s*$/i) {
> > @@ -3948,11 +3953,19 @@ sub compile_ebtables_filter {
> > ruleset_create_chain($ruleset, "PVEFW-FORWARD");
> >
> > ruleset_create_chain($ruleset, "PVEFW-FWBR-OUT");
> > +
> > + if ($cluster_conf->{options}->{ebtables_dst_macfilter}) {
> > + #filtering destination mac for ipv4/ipv6
> > + ruleset_create_chain($ruleset, "PVEFW-FWBR-IN");
> > + ruleset_addrule($ruleset, 'PVEFW-FORWARD', '-i fwln+', '-j
> > PVEFW-FWBR-IN');
> > + }
> > +
> > #for ipv4 and ipv6, check macaddress in iptables, so we use
> > conntrack 'ESTABLISHED', to speedup rules
> > ruleset_addrule($ruleset, 'PVEFW-FORWARD', '-p IPv4', '-j
> > ACCEPT');
> > ruleset_addrule($ruleset, 'PVEFW-FORWARD', '-p IPv6', '-j
> > ACCEPT');
> > ruleset_addrule($ruleset, 'PVEFW-FORWARD', '-o fwln+', '-j
> > PVEFW-FWBR-OUT');
> >
> > + my $maclist = [];
> > # generate firewall rules for QEMU VMs
> > foreach my $vmid (sort keys %{$vmdata->{qemu}}) {
> > eval {
> > @@ -3975,7 +3988,7 @@ sub compile_ebtables_filter {
> > push(@$arpfilter, $ip);
> > }
> > }
> > - generate_tap_layer2filter($ruleset, $iface,
> > $macaddr, $vmfw_conf, $vmid, $arpfilter);
> > + generate_tap_layer2filter($ruleset, $iface,
> > $macaddr, $vmfw_conf, $vmid, $arpfilter, $maclist);
> > }
> > };
> > warn $@ if $@; # just to be sure - should not happen
> > @@ -4012,17 +4025,23 @@ sub compile_ebtables_filter {
> > push @$arpfilter, $ip;
> > }
> > }
> > - generate_tap_layer2filter($ruleset, $iface,
> > $macaddr, $vmfw_conf, $vmid, $arpfilter);
> > + generate_tap_layer2filter($ruleset, $iface,
> > $macaddr, $vmfw_conf, $vmid, $arpfilter, $maclist);
> > }
> > };
> > warn $@ if $@; # just to be sure - should not happen
> > }
> >
> > + if ($cluster_conf->{options}->{'ebtables_dst_macfilter'} &&
> > @$maclist > 0) {
> > + push @$maclist, 'ff:ff:ff:ff:ff:ff'; #allow broadcast mac
> > + my $maclist_str = join ',',sort(@$maclist);
> > + ruleset_addrule($ruleset, 'PVEFW-FWBR-IN', "--among-dst !
> > $maclist_str,", '-j DROP');
> > + }
> > +
> > return $ruleset;
> > }
> >
> > sub generate_tap_layer2filter {
> > - my ($ruleset, $iface, $macaddr, $vmfw_conf, $vmid, $arpfilter)
> > = @_;
> > + my ($ruleset, $iface, $macaddr, $vmfw_conf, $vmid, $arpfilter,
> > $maclist) = @_;
> > my $options = $vmfw_conf->{options};
> >
> > my $tapchain = $iface."-OUT";
> > @@ -4037,6 +4056,10 @@ sub generate_tap_layer2filter {
> > ruleset_addrule($ruleset, $tapchain, "-s ! $macaddr",
> > '-j DROP');
> > }
> >
> > + if (defined($macaddr)) {
> > + push @$maclist, $macaddr;
> > + }
> > +
> > if (@$arpfilter){
> > my $arpchain = $tapchain."-ARP";
> > ruleset_addrule($ruleset, $tapchain, "-p ARP", "-j
> > $arpchain");
> > @@ -4225,6 +4248,15 @@ sub get_ebtables_cmdlist {
> > next if ! $pve_include;
> > $pve_include = 0;
> > }
> > +
> > + if ($cmd =~ m/^-A (\S+) --among-dst ! (\S+) -j DROP/) {
> > + my $chain = $1;
> > + my $maclist_raw = $2."\n";
> > + my $filename =
> > "$pve_fw_status_dir/ebtables_macfilter-$chain";
> > + PVE::Tools::file_set_contents($filename,
> > $maclist_raw);
> > + $cmd = "-A $1 --among-dst-file ! $filename -j
> > DROP";
> > + }
> > +
> > $cmdlist .= "$cmd\n";
> > }
> > }
> > --
> > 2.30.2
>
More information about the pve-devel
mailing list