Hi misc@,

I have been working with VMM more lately. It's a real joy to use. Very
simple.

I'm wondering what a recommended approach would be for potentially
untrusted VMs. It's commonplace, in VPS hosting, to restrict the VM to
its own IPs at the host level. Wouldn't want one server to spoof IPs of
another.

In this case, I am working with IPv6 and the host has its own /64. I am
wanting to issue /112s to each VM.

My first test was to put each VM on its own veb and route the /112 out
of the physical ethernet interface. This seems like it would work, in
theory, but the host doesn't respond to icmp6 "who-has"-style requests
for a VM's IP. Thus, the upstream router doesn't know to address traffic
to the host's MAC, and for it to forward it on.

I know another approach is to put all on the same bridge interface with
he physical NIC. This is probably more performant.

I guess in that case, with all VMs on the same veb, I would create tap
interfaces in advance and use pf to filter on the tap interfaces? Or
would that not quite work with the nature of veb?

VMM does provide a handy way to lock the MAC address at that layer,
which is nice to have that attack surface already covered.

Appreciate any advice you can offer.

-Henrich

Reply via email to