Security: Sniffing/IP Spoof prevention on KVM machines (or ethernet openvz machines)

jinjer

Renowned Member
Oct 4, 2010
204
7
83
Hi,

I'm trying to assest the security regarding the IP spoofing or sniffing data by rogue or untrusted kvm guests (or openvz containers running an ethernet device).

My concern is regarding security of running rogue/untrusted or simply uncontrolled virtual machine instances, including the following:

1. A intentional or unintentional sniffing on the virtual ethernet device (kvm/openvz). This could be done by a hacked guest or rogue user.

2. An ip spoofing/changing the IP of a KVM/openvz guest to a different value than originally assigned. This might be used to get traffic for other machines on the same host or perhaps on different hosts.

3. Spoofing of the MAC address assigned to KVM/OpenVZ Ethernet device: Usable to reroute traffic/mim attacks etc.

jinjer
 
Re: Security: Sniffing/IP Spoof prevention on KVM machines (or ethernet openvz machin

bump
 
Re: Security: Sniffing/IP Spoof prevention on KVM machines (or ethernet openvz machin

Hi, I think it can be done with iptables manually.

But I'll try code something in the coming month for this. (ip spoofing,mac spoofing)
But we need to add guest ip configuration to proxmox gui before that, it'll require some work.