Sfoglia il codice sorgente

PVE firewall and NDP

Håvard O. Nordstrand 5 anni fa
parent
commit
6afc0eb00f
1 ha cambiato i file con 1 aggiunte e 0 eliminazioni
  1. 1 0
      config/linux-servers/proxmox-ve.md

+ 1 - 0
config/linux-servers/proxmox-ve.md

@@ -146,6 +146,7 @@ See: [Proxmox: High Availability](https://pve.proxmox.com/wiki/High_Availability
 - The firewall is pretty pre-configured for most basic stuff, like connection tracking and management network access.
 - The firewall is pretty pre-configured for most basic stuff, like connection tracking and management network access.
 - Host NDP problem:
 - Host NDP problem:
     - For hosts, there is a vulnerability where the hosts autoconfigures itself for IPv6 on all bridges (see [Bug 1251 - Security issue: IPv6 autoconfiguration on Bridge-Interfaces ](https://bugzilla.proxmox.com/show_bug.cgi?id=1251)).
     - For hosts, there is a vulnerability where the hosts autoconfigures itself for IPv6 on all bridges (see [Bug 1251 - Security issue: IPv6 autoconfiguration on Bridge-Interfaces ](https://bugzilla.proxmox.com/show_bug.cgi?id=1251)).
+    - Even though you firewall off management traffic to the host, the host may still use the "other" networks as default gateways.
     - To partially fix this, disable NDP on all nodes and add a rule allowing protocol "ipv6-icmp" on trusted interfaces.
     - To partially fix this, disable NDP on all nodes and add a rule allowing protocol "ipv6-icmp" on trusted interfaces.
     - To verify that it's working, reboot and check its IPv6 routes and neighbors.
     - To verify that it's working, reboot and check its IPv6 routes and neighbors.
 - Check firewall status: `pve-firewall status`
 - Check firewall status: `pve-firewall status`