Security: Sniffing/IP Spoof prevention on KVM machines (or ethernet openvz machines)

jinjer

Renowned Member
Oct 4, 2010
204
7
83
Hi,

I'm trying to assest the security regarding the IP spoofing or sniffing data by rogue or untrusted kvm guests (or openvz containers running an ethernet device).

My concern is regarding security of running rogue/untrusted or simply uncontrolled virtual machine instances, including the following:

1. A intentional or unintentional sniffing on the virtual ethernet device (kvm/openvz). This could be done by a hacked guest or rogue user.

2. An ip spoofing/changing the IP of a KVM/openvz guest to a different value than originally assigned. This might be used to get traffic for other machines on the same host or perhaps on different hosts.

3. Spoofing of the MAC address assigned to KVM/OpenVZ Ethernet device: Usable to reroute traffic/mim attacks etc.

jinjer
 
Re: Security: Sniffing/IP Spoof prevention on KVM machines (or ethernet openvz machin

bump
 
Re: Security: Sniffing/IP Spoof prevention on KVM machines (or ethernet openvz machin

Hi, I think it can be done with iptables manually.

But I'll try code something in the coming month for this. (ip spoofing,mac spoofing)
But we need to add guest ip configuration to proxmox gui before that, it'll require some work.
 

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!