Linux Netfilter discussions
 help / color / mirror / Atom feed
From: Jonathan Tripathy <jonnyt@abpni.co.uk>
To: thomas.berg@branndal.se, netfilter@vger.kernel.org
Subject: Re: VLANs
Date: Tue, 11 Jan 2011 10:26:53 +0000	[thread overview]
Message-ID: <4D2C306D.3020709@abpni.co.uk> (raw)
In-Reply-To: <1294733963.12295.11.camel@thober-desktop>


On 11/01/11 08:19, Thomas Berg wrote:
> mån 2011-01-10 klockan 22:15 +0000 skrev Jonathan Tripathy:
>> On 10/01/11 21:33, John Haxby wrote:
>>> On 10 Jan 2011, at 17:42, Jonathan Tripathy wrote:
>>>
>>>> I wish to use VLANs on my Linux Xen hosts to seperate managed customer networks.
>>>>
>>>> Can anybody please give me some pointers on how to make the network secure so no-one can VLAN hop?
>>>>
>>>> At the minute, I plan to set up one bridge per customer, and use linux vconfig to add an if to the bridge (which I believe strips all tags). Then, all the respective customer Xen DomU (VM) interfaces will connect to the bridge.
>>> If each bridge (for each customer) contains just one vlan-tagged physical interface then there is no way for the guests to vlan-hop.  A vlan tag added by a guest will either be replaced by the vlan tag of the external interface or the frame will be dropped.  If you have multiple vlans on a bridge (with multiple physical interfaces) then the vlan will be chosen by routing if the interfaces have their own addresses, I'm not sure what happens if the interfaces don't have addresses, but when a frame leaves on a vlan interface it acquires the corresponding vlan tag.  It doesn't matter what happens to the tag on the way back as it's only relevant to an interface that's on a vlan.
>>>
>>> Obviously you should test this, but it's all pretty straightforward and there's nothing special or complicated to set up.
>>>
>>> jch
>> Excellent! Thank you for your explanation.
>>
>> If a guest maliciously added a vlan tag, wouldn’t it still remain in the
>> frame, however be "double-tagged" by the outgoing physical port? Even
>> still though, this probably isn't an issue, provided that all upstream
>> switches are configured correctly.
>>
> There is an sencario where your customer can make a mess. If the outer
> vlan tag is the same as port vlan id aka native vlan on a dot1q enabled
> port it will remove the outer tag and forward the packet only with the
> inner tag wich was set by your customer.
>
> I should suggest that you only allow ipv4 and arp passing trough to/from
> your customer and drop any other frames including frames with vlan tag
> set and ethertype x8100.
Hi Thomas,

While I have made sure that my trunk ports do not have a native vlan 
associated with them, I still think it's a good idea to use ebtables to 
prevent tagging from the customers. What would the command be?

Thanks

  reply	other threads:[~2011-01-11 10:26 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-01-10 17:42 VLANs Jonathan Tripathy
2011-01-10 21:33 ` VLANs John Haxby
2011-01-10 22:15   ` VLANs Jonathan Tripathy
2011-01-11  8:19     ` VLANs Thomas Berg
2011-01-11 10:26       ` Jonathan Tripathy [this message]
2011-01-11 10:42     ` VLANs John Haxby
2011-01-11 10:57       ` VLANs Jonathan Tripathy
     [not found]         ` <4D2C47DB.10702@oracle.com>
2011-01-11 12:24           ` VLANs Jonathan Tripathy
2011-01-11 12:48             ` VLANs John Haxby
2011-01-11 12:52               ` VLANs Jonathan Tripathy
2011-01-11 17:12                 ` VLANs John Haxby
2011-01-11 17:15                   ` VLANs Jonathan Tripathy
2011-01-11 17:21                     ` VLANs John Haxby
  -- strict thread matches above, loose matches on Subject: below --
2011-01-05 12:12 VLANs Jonathan Tripathy
2011-01-06  7:32 ` VLANs John Haxby

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4D2C306D.3020709@abpni.co.uk \
    --to=jonnyt@abpni.co.uk \
    --cc=netfilter@vger.kernel.org \
    --cc=thomas.berg@branndal.se \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox