Skip to content

Commit 2a4d40d

Browse files
committed
Add vm and vnet ns block wireserver port 80 rule
1 parent 5cad713 commit 2a4d40d

File tree

2 files changed

+12
-0
lines changed

2 files changed

+12
-0
lines changed

network/network_linux.go

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,12 @@ func (nm *networkManager) newNetworkImpl(nwInfo *NetworkInfo, extIf *externalInt
9898
return nil, fmt.Errorf("Ipv4 forwarding failed: %w", err)
9999
}
100100
logger.Info("Ipv4 forwarding enabled")
101+
// iptables -t filter -I FORWARD -j DROP -d 168.63.129.16/32 -p tcp -m tcp --dport 80
102+
dropWireserver := "-d 168.63.129.16/32 -p tcp -m tcp --dport 80"
103+
if err := iptables.InsertIptableRule(iptables.V4, "filter", "FORWARD", dropWireserver, "DROP"); err != nil {
104+
return nil, fmt.Errorf("unable to insert vm iptables rule drop all wireserver port 80 packets: %w", err)
105+
}
106+
logger.Info("Block wireserver traffic rule added")
101107
default:
102108
return nil, errNetworkModeInvalid
103109
}

network/transparent_vlan_endpointclient_linux.go

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -404,6 +404,12 @@ func (client *TransparentVlanEndpointClient) AddVnetRules(epInfo *EndpointInfo)
404404
if err := iptables.InsertIptableRule(iptables.V4, "mangle", "PREROUTING", match, "ACCEPT"); err != nil {
405405
return errors.Wrap(err, "unable to insert iptables rule accept all incoming from vlan interface")
406406
}
407+
// iptables -t filter -I FORWARD -j DROP -d 168.63.129.16/32 -p tcp -m tcp --dport 80 -m comment --comment "block traffic to 168.63.129.16 port 80"
408+
dropWireserver := "-d 168.63.129.16/32 -p tcp -m tcp --dport 80"
409+
if err := iptables.InsertIptableRule(iptables.V4, "filter", "FORWARD", dropWireserver, "DROP"); err != nil {
410+
return errors.Wrap(err, "unable to insert iptables rule drop all wireserver port 80 packets")
411+
}
412+
407413
// Packets that are marked should go to the tunneling table
408414
newRule := vishnetlink.NewRule()
409415
newRule.Mark = tunnelingMark

0 commit comments

Comments
 (0)