Drop outgoing IPv4 multicast traffic at AQL
authorAurelien Jarno <aurelien@aurel32.net>
Thu, 20 Apr 2017 15:59:53 +0000 (17:59 +0200)
committerAurelien Jarno <aurelien@aurel32.net>
Thu, 20 Apr 2017 15:59:53 +0000 (17:59 +0200)
Some packages like gst-rtsp-server1.0 generate multicast traffic in
their testsuite. This triggers protections at AQL. Avoid this by
dropping all the outgoing IPv4 multicast traffic.

Signed-off-by: Aurelien Jarno <aurelien@aurel32.net>
modules/ferm/manifests/aql.pp [new file with mode: 0644]
modules/ferm/manifests/per_host.pp

diff --git a/modules/ferm/manifests/aql.pp b/modules/ferm/manifests/aql.pp
new file mode 100644 (file)
index 0000000..b5578e2
--- /dev/null
@@ -0,0 +1,10 @@
+class ferm::aql {
+       @ferm::rule { 'dsa-drop-multicast':
+               domain      => 'ip',
+               description => 'drop multicast traffic to avoid triggering protection',
+               table       => 'filter',
+               chain       => 'OUTPUT',
+               rule        => 'destination 224.0.0.0/24 jump log_or_drop'
+       }
+}
+
index f736213..d6c4343 100644 (file)
@@ -3,6 +3,10 @@ class ferm::per_host {
                include ferm::zivit
        }
 
+       if (scope.lookupvar('site::nodeinfo')['hoster']['name'] == "aql") {
+               include ferm::aq
+       }
+
        case $::hostname {
                czerny,clementi: {
                        @ferm::rule { 'dsa-upsmon':