Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update from update/networkservicemesh/cmd-forwarder-vpp #1310

Merged
merged 1 commit into from
May 15, 2021

Conversation

nsmbot
Copy link
Collaborator

@nsmbot nsmbot commented May 15, 2021

commit f7dd339 Author: NSMBot nsmbot@networkservicmesh.io Date: Sat May 15 01:45:33 2021 +0000 Update application version to latest version from networkservicemesh/cmd-forwarder-vpp@main networkservicemesh/cmd-forwarder-vpp# networkservicemesh/cmd-forwarder-vpp PR link: https://github.com/networkservicemesh/cmd-forwarder-vpp/pull/ networkservicemesh/cmd-forwarder-vpp commit message: commit 5fc9f248bfac3bdecabea19dfdd030f0712406b3 Author: Ed Warnicke hagbard@gmail.com Date: Fri May 14 20:45:16 2021 -0500 Block AF_PACKET bound tunnel interface from communication (#191) When binding to the tunnel interface with AF_PACKET, we should not respond to anything except valid tunnel packets. vppinit does this by applying a DENYALL ACL. Individual tunnel chain elements are then responsible for poking a 'hole' in the DENYALL ACL for themselves. See: https://github.com/networkservicemesh/sdk-vpp/tree/main/pkg/networkservice/mechanisms/vxlan/vxlanacl Signed-off-by: Ed Warnicke hagbard@gmail.com Signed-off-by: NSMBot nsmbot@networkservicmesh.io

…cmd-forwarder-vpp@main networkservicemesh/cmd-forwarder-vpp#

networkservicemesh/cmd-forwarder-vpp PR link: https://github.com/networkservicemesh/cmd-forwarder-vpp/pull/

networkservicemesh/cmd-forwarder-vpp commit message:
commit 5fc9f248bfac3bdecabea19dfdd030f0712406b3
Author: Ed Warnicke <hagbard@gmail.com>
Date:   Fri May 14 20:45:16 2021 -0500

    Block AF_PACKET bound tunnel interface from communication (#191)

    When binding to the tunnel interface with AF_PACKET, we should *not*
    respond to anything except valid tunnel packets.

    vppinit does this by applying a DENYALL ACL.

    Individual tunnel chain elements are then responsible for poking a 'hole'
    in the DENYALL ACL for themselves.  See:

    https://github.com/networkservicemesh/sdk-vpp/tree/main/pkg/networkservice/mechanisms/vxlan/vxlanacl

    Signed-off-by: Ed Warnicke <hagbard@gmail.com>

Signed-off-by: NSMBot <nsmbot@networkservicmesh.io>
@github-actions github-actions bot merged commit 0f893e6 into main May 15, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant