-
Notifications
You must be signed in to change notification settings - Fork 239
Blocking traffic with nwfilter
https://github.com/code-ready/crc/issues/1242#issuecomment-629698002
Ref: https://libvirt.org/formatnwfilter.html
- blocked UDP port 123 out of my local gateway
Turns out this can be done directly for the crc VM with libvirt on linux
$ cat drop-ntp.xml
<filter name='drop-ntp' chain='ipv4'>
<rule action='drop' direction='out' >
<ip protocol='udp' dstportstart='123'/>
</rule>
<rule action='drop' direction='in' priority='100'>
<ip protocol='udp' srcportstart='123'/>
</rule>
</filter>
$ virsh -c qemu:///system nwfilter-define drop-ntp.xml
$ virsh -c qemu:///system edit crc
Then, in crc XML definitions, a <filterref>
element needs to be added:
<domain>
...
<devices>
...
<interface type='network'>
...
<filterref filter='drop-ntp'/>
</interface>
This filter can be applied dynamically to a running VM using virt-xml
:
$ virt-xml -c qemu:///system crc --edit --update --network filterref.filter='drop-ntp'
With that in place, we can run the cluster "in the future" by changing this in the domain xml:
<clock offset='variable' adjustment='30000' basis='utc'>
'adjustment' being a value in seconds. I need to experiment a bit more with this, as to exercise the cert recovery code, we probably need to change the time on the host too, and with NTP blocked, the cluster will probably sync with the host time without needing any changes to that <clock>
element.
A similar nwfilter rule can be used for http/https traffic, this is useful for proxy testing. If the proxy is running on ports 3128/3129, this filter will block most http/https traffic which is not going through the proxy:
<filter name='drop-http-https' chain='ipv4'>
<rule action='drop' direction='out' >
<ip protocol='tcp' dstportstart='443'/>
</rule>
<rule action='drop' direction='in' priority='100'>
<ip protocol='tcp' srcportstart='443'/>
</rule>
<rule action='drop' direction='out' >
<ip protocol='tcp' dstportstart='80'/>
</rule>
<rule action='drop' direction='in' priority='100'>
<ip protocol='tcp' srcportstart='80'/>
</rule>
</filter>