|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-users
Re: [Xen-users] XCP Xen Cloud Control System ver 0.3 released! 
| 
On 2010-05-25, at 3:15 PM, "Iustin Pop" <iusty@xxxxxxxxx> wrote:
 
On Tue, May 25, 2010 at 10:04:26AM -0400, Vern Burke wrote:
 
I only do static IP assignments on the VMs. I have no idea how you'd
stop a VM from running a DHCP server from outside the VM (not that I
can imagine why anyone would want to do that anyways). The best
answer I've found for a lot of shennanigans is a zero tolerance
policy in the terms of service (do it and you're gone, period).
 
 From http://en.wikipedia.org/wiki/DHCP: "DHCP uses the same two  
ports assigned
by IANA for BOOTP: 67/udp for sending data to the server, and 68/udp  
for data 
to the client."
You could simply filter packets on port 67/udp towards the VM, so it  
doesn't
see the requests, and on port 68/udp from the VM, so it's not able  
to reply. 
regards,
iustin
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
 
The original question was that a VM's IP is configured by a DHCP  
server and the concern was that they did not want a rogue DHCP server  
to cause problems. So if the solution is to use iptables, you can not  
just block udp ports, but you would have to have pass rules from the  
legitate IP addresses. Using ebtables may also help for link-layer  
protocols. 
It's always good practice to know the communications and data flows in  
your environment. Testing for rogue servers doing dhcp is a good idea,  
especially with wireless and vm environments. Passing data to an  
unexpected default gateway would not be good so making sure no one is  
passing themselves off as the default gateway is another step. 
Frank
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
 | 
 |  | 
  
    |  |  |