[NEW TEST] Return flow with spoofed IP
Bug #1526146 reported by
Michael Micucci
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Zephyr |
Fix Committed
|
High
|
Michael Micucci |
Bug Description
Scenario VM1 with standard IP and VM2 with standard + spoofed IP.
VM1 pings spoofed IP
VM2 receives ping request, sends reply.
Reply packet should be caught by the anti-spoof filter and dropped before it enters the neutron network.
Make sure this uses a RETURN FLOW (single-way flows are already tested).
Changed in zephyr-neutron: | |
status: | New → In Progress |
importance: | Undecided → High |
assignee: | nobody → Michael Micucci (micucci-t) |
no longer affects: | zephyr-neutron/master |
Changed in zephyr-neutron: | |
status: | In Progress → Fix Committed |
Changed in zephyr-neutron: | |
status: | Fix Committed → Fix Released |
status: | Fix Released → In Progress |
status: | In Progress → Fix Committed |
To post a comment you must log in.
https:/ /review. gerrithub. io/#/c/ 255416/