yangjianfeng d600b3d433 Forbid enable ndp proxy when external netwrok has no IPv6 address scope
In neutron, user can create multiple ports with same IPv6 address if
the network has no IPv6 address scope. This maybe result in some
security issues.

This can be exploited by a malicious tenant via creating a subnet with
a prefix that covers an address that is already in use and take over
(part of) the traffic flowing towards that address. The success of the
attack depends on winning the race of who answers the NDP query first,
but still a 50% chance of capturing traffic seems dangerous. The attack
works not only against other addresses served by NDP proxy, but also
against other hosts that may exist, potentially even the gateway for
the external network.

So, we should use `IPv6 address scope` to ensure the IPv6 address is
unique when we want to use `ndp proxy` feature.

Depends-on: https://review.opendev.org/#/c/855997
Closes-Bug: #1987410
Change-Id: I0fa431a91a7679e409386a357a01c31ec5ad0cfd
2022-09-06 18:45:45 +08:00
2016-06-28 22:46:19 +02:00
2022-08-31 16:40:35 +00:00
2016-10-17 17:06:19 +05:30
2019-04-19 19:38:27 +00:00
2014-05-16 13:40:04 -04:00
2020-07-28 16:55:52 +00:00
2021-01-24 17:18:55 +02:00
2017-03-04 11:19:58 +00:00

OpenStack Neutron

image

Neutron is an OpenStack project to provide "network connectivity as a service" between interface devices (e.g., vNICs) managed by other OpenStack services (e.g., Nova).

To learn more about neutron:

If you would like to contribute to Neutron, please read the file CONTRIBUTING.rst or see the Neutron contributor guide:

https://docs.openstack.org/neutron/latest/contributor/contributing.html

Get in touch via email. Use [Neutron] in your subject.

Description
OpenStack Networking (Neutron)
Readme 1,017 MiB
Languages
Python 99.7%
Shell 0.3%