yangjianfeng
d600b3d433
Forbid enable ndp proxy when external netwrok has no IPv6 address scope
In neutron, user can create multiple ports with same IPv6 address if the network has no IPv6 address scope. This maybe result in some security issues. This can be exploited by a malicious tenant via creating a subnet with a prefix that covers an address that is already in use and take over (part of) the traffic flowing towards that address. The success of the attack depends on winning the race of who answers the NDP query first, but still a 50% chance of capturing traffic seems dangerous. The attack works not only against other addresses served by NDP proxy, but also against other hosts that may exist, potentially even the gateway for the external network. So, we should use `IPv6 address scope` to ensure the IPv6 address is unique when we want to use `ndp proxy` feature. Depends-on: https://review.opendev.org/#/c/855997 Closes-Bug: #1987410 Change-Id: I0fa431a91a7679e409386a357a01c31ec5ad0cfd
OpenStack Neutron
Neutron is an OpenStack project to provide "network connectivity as a service" between interface devices (e.g., vNICs) managed by other OpenStack services (e.g., Nova).
To learn more about neutron:
- Documentation: https://docs.openstack.org/neutron/latest/
- Features: https://specs.openstack.org/openstack/neutron-specs
- Defects: https://launchpad.net/neutron
- Release notes: https://docs.openstack.org/releasenotes/neutron/index.html
- Source: https://opendev.org/openstack/neutron
If you would like to contribute to Neutron, please read the file CONTRIBUTING.rst or see the Neutron contributor guide:
https://docs.openstack.org/neutron/latest/contributor/contributing.html
Get in touch via email. Use [Neutron] in your subject.
Description
Languages
Python
99.7%
Shell
0.3%