08108c4199
It was found that adding ebtables rules to the filter table FORWARD chain could be vulnerable to a DoS attack. Moving to the nat table PREROUTING chain should mitigate this as it is consulted prior to allowing the frame in. In order to make this work with upgrades, had to make the code detect and remove any old rules that might still exist in the filter table. That can be removed after a cycle. Added some unit tests in addition to the existing functional tests. Change-Id: I87852b21db4404c58c83789cc267812030ac7d5f Closes-bug: #1732294 |
||
---|---|---|
api-ref | ||
bin | ||
devstack | ||
doc | ||
etc | ||
neutron | ||
playbooks | ||
rally-jobs | ||
releasenotes | ||
tools | ||
.coveragerc | ||
.gitignore | ||
.gitreview | ||
.mailmap | ||
.pylintrc | ||
.stestr.conf | ||
.testr.conf | ||
.zuul.yaml | ||
CONTRIBUTING.rst | ||
HACKING.rst | ||
LICENSE | ||
README.rst | ||
TESTING.rst | ||
babel.cfg | ||
bindep.txt | ||
requirements.txt | ||
setup.cfg | ||
setup.py | ||
test-requirements.txt | ||
tox.ini |
README.rst
Team and repository tags
Welcome!
To learn more about neutron:
- Documentation: https://docs.openstack.org
- Features: https://specs.openstack.org/openstack/neutron-specs
- Defects: https://launchpad.net/neutron
Get in touch via email. Use [Neutron] in your subject.
To learn how to contribute:
CONTRIBUTING.rst