"Daniel P. Berrange" <berrange@redhat.com> wrote on 03/31/2010 03:44:48 PM:

> Please respond to "Daniel P. Berrange"

>
> On Tue, Mar 30, 2010 at 01:56:52PM -0400, Stefan Berger wrote:
> > Subject: Support for learning a VM's IP address
>
> > A caveat: The algorithm does not know which one is the appropriate IP
> > address of a VM. If the VM spoofs an IP address in its first ARP traffic
> > or IPv4 packets its filtering rules will be instantiated for this IP
> > address, thus 'locking' it to the found IP address. So, it's still
> > 'safer' to explicitly provide the IP address of a VM's interface in the
> > filter description if it is known beforehand.
>
> While this code is very clever, I'm not really convinced that having a
> learning capability that snifs arbitrary IP packets for an address is
> desirable. The primary task of the nwfilter mechanism is to provide secure
> isolation of the VM from other VMs & network protocols. Basing this ontop
> of a learning mode that we know can be trivially poisoned/exploited by
> sending fake ARPs just doesn't seem like a good plan - it is providing
> users a false sense of security.


That's correct. It mostly provides 'convenience'.

>
> The only way I could see this working in a reasonably secure manner is to
> start from the assigned MAC address that we know & can trust. Then listen for
> DHCP OFFERS (IPv4/6) matching the MAC address, and extract the IP from that.


I am actually doing that, though I am only comparing the destination MAC address
in that case so far and not the MAC address in the DHCP OFFER itself. The DHCP response
is unicasted, so I don't currently compare the MAC address in the DHCP OFFER, but
that would be trivial to add.

The problem with libpcap is that the sockets it is using don't give a guarantee that
none of the packets will be missed -- afaik. Missing that one DHCP OFFER could then be fatal
and waiting for the lease timeout probably not an option. Are there other options?

I'd like to keep the algorithm as much as possible as it is now but be able to tell
the thread to only look for dhcp offers for example, provided that this could be
done in a reliable manner. If a trusted DHCP server was provided, the thread could
be acting this way, otherwise it could rely on ARP, IPv4 or DHCP Offer. It would
be a matter of configuration of libvirt how the learning actually works.

> This assumes DHCP OFFERS come from a trusted server, so we need to make sure
> that other VMs can't spoof DHCP OFFERS. Either the admin could include a
> DHCP blocking rule in the nwfilter config for all VMs (needs to be on all
> hosts), or have a host config parameter for nwfilter to specify the trusted
> DHCP server address. If done right, this gives a IP addr learning mode which
> the VM can't poison with an IP of its choosing.


Only the missing of packets is fatal...

>
> For IPv6 the network might use DHCPv6 which we can procss in much the same
> way, or it might be doing stateless autoconfig. So we'd need some host level
> config parameter to specify whether to learn based on DHCPv6, or based on
> the router advertisments. In the latter case a VM auto-assigns  itself an
> IPv6 address based on the router prefix + its MAC address. So if we spot
> the router prefix + know the MAC addr we can safely set the IPv6 addr filter


The issue with looking out for multiple parameters, i.e., IP and IPv6 (as well know
address parameters) is that if only one parameter was found a partial instantiation of
the filters would be possible. I don't support something like this at the moment, so
I would only want to wait for one parameter 'IP'... :-/ Also waiting for IP or
IPv6 while the other is already known could take some time...

Regards,
   Stefan

>
> Regards,
> Daniel
> --
> |: Red Hat, Engineering, London    -o-  
http://people.redhat.com/berrange/:|
> |:
http://libvirt.org -o- http://virt-manager.org -o- http://deltacloud.org:|
> |:
http://autobuild.org        -o-         http://search.cpan.org/~danberr/:|
> |: GnuPG: 7D3B9505  -o-   F3C9 553F A1DA 4AC2 5648 23C1 B3DF F742 7D3B 9505 :|