Hey there,
on a large PVE cluster all vms are flooded with many ARP Requests.
(PVE 8.1.10 / Linux 6.5.13-3-pve)
With the implementation of ebtables the replies are filtered correctly to prevent ARP spoofing:
Goal:
How can another chain implemented to also filter incoming ARP requests that the VM only gets the ARP request for itself instead of only replies to ARP requests for itself?
If a custom chain is created for a tap device, the chain will be removed after seconds.
For example, if I try to block all incoming ARP requests at all:
The chain is created successfully but removed after some seconds.
Are there any plans to integrate Inbound filtering of ARP requests to ebtables in proxmox by default?
Other related topics:
- Filter ARP replies (not requests) (https://forum.proxmox.com/threads/filter-arp.34973)
- Proxmox Docs (Disable Bridge Mac Learning) (https://pve.proxmox.com/wiki/Network_Configuration)
on a large PVE cluster all vms are flooded with many ARP Requests.
(PVE 8.1.10 / Linux 6.5.13-3-pve)
Code:
tcpdump -ennqti any arp
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
ens18 B ifindex 2 88:30:37 Request who-has <redacted> tell <router-ip>, length 46
With the implementation of ebtables the replies are filtered correctly to prevent ARP spoofing:
Code:
ebtables --list
Bridge chain: tap25272i0-OUT, entries: 3, policy: ACCEPT
-s ! <vm-mac-address> -j DROP
-p ARP -j tap25272i0-OUT-ARP
-j ACCEPT
Bridge chain: tap25272i0-OUT-ARP, entries: 2, policy: ACCEPT
-p ARP --arp-ip-src <vm-ipv4> -j RETURN
-j DROP
Goal:
How can another chain implemented to also filter incoming ARP requests that the VM only gets the ARP request for itself instead of only replies to ARP requests for itself?
If a custom chain is created for a tap device, the chain will be removed after seconds.
For example, if I try to block all incoming ARP requests at all:
Code:
ebtables --new-chain tap25272i0-IN
ebtables --append tap25272i0-IN -p ARP -j DROP
The chain is created successfully but removed after some seconds.
Are there any plans to integrate Inbound filtering of ARP requests to ebtables in proxmox by default?
Other related topics:
- Filter ARP replies (not requests) (https://forum.proxmox.com/threads/filter-arp.34973)
- Proxmox Docs (Disable Bridge Mac Learning) (https://pve.proxmox.com/wiki/Network_Configuration)