You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The service monitor MAC is exposed through the following flow:
ovn_lflow_add(lflows, od, S_SWITCH_IN_L2_LKUP, 110,
"eth.dst == $svc_monitor_mac",
"handle_svc_check(inport);");
This doesn't handle rate limit via CoPP. There is potential to
DoS ovn-controller even on deployments with CoPP enabled and configured
as all packets with this destination mac within the switch are sent directly to pinctrl thread in ovn-controller.
Issue:
The service monitor MAC is exposed through the following flow:
ovn_lflow_add(lflows, od, S_SWITCH_IN_L2_LKUP, 110,
"eth.dst == $svc_monitor_mac",
"handle_svc_check(inport);");
This doesn't handle rate limit via CoPP. There is potential to
DoS ovn-controller even on deployments with CoPP enabled and configured
as all packets with this destination mac within the switch are sent directly to pinctrl thread in ovn-controller.
Reference :
https://bugzilla.redhat.com/show_bug.cgi?id=2213279
Fix required :
Unknown
Can we have a look at this issue to find out if there could be a possible DoS attack ?
The text was updated successfully, but these errors were encountered: