On 24.09.21 10:48, Alexandre Derumier wrote:
> Currently, if bridge receive an unknown dest mac (network bug/attack/..),
> we are flooding packets to all bridge ports.
> 
> This can waste cpu time, even more with firewall enabled.
> Also, if firewall is used with reject action, the src mac of RST
> packet is the original unknown dest mac.
> (This can block the server at Hetzner for example)
> 
> So, we can disable learning && unicast_flood on tap|veth|fwln port interface.
> Then mac address need to be add statically in bridge fdb.
> 
> 
> Alexandre Derumier (2):
>   network: add support for disabling bridge learning on tap|veth|fwln
>     ports
>   Inotify: add bridge-disable-mac-learning option to bridges.
> 
>  src/PVE/INotify.pm |  4 +++-
>  src/PVE/Network.pm | 60 +++++++++++++++++++++++++++++++++++++++++-----
>  2 files changed, 57 insertions(+), 7 deletions(-)
> 



applied, thanks! But I moved from the single flag to an $opts hash for the 
tap_plug
option, nicer to use than those overly long parameter flags list, that often 
have
lots of slightly confusing undef mixed in.

You need to adapt the calling site of the relevant open patches though (sorry 
for
the added work).


_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to