[NEW TEST] Return flow with spoofed IP

Bug #1526146 reported by Michael Micucci
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Zephyr
Fix Committed
High
Michael Micucci

Bug Description

Scenario VM1 with standard IP and VM2 with standard + spoofed IP.

VM1 pings spoofed IP

VM2 receives ping request, sends reply.

Reply packet should be caught by the anti-spoof filter and dropped before it enters the neutron network.

Make sure this uses a RETURN FLOW (single-way flows are already tested).

Changed in zephyr-neutron:
status: New → In Progress
importance: Undecided → High
assignee: nobody → Michael Micucci (micucci-t)
Revision history for this message
Michael Micucci (micucci-t) wrote :
no longer affects: zephyr-neutron/master
Changed in zephyr-neutron:
status: In Progress → Fix Committed
Changed in zephyr-neutron:
status: Fix Committed → Fix Released
status: Fix Released → In Progress
status: In Progress → Fix Committed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.