vxlan: Protect against tunnel config where source is not local 44/30444/4
authorNeale Ranns <nranns@cisco.com>
Wed, 16 Dec 2020 13:06:58 +0000 (13:06 +0000)
committerOle Tr�an <otroan@employees.org>
Thu, 14 Jan 2021 11:43:41 +0000 (11:43 +0000)
commit1b5ca985dc51bea730ce5ee799641c75f73a0f26
tree430c91891d54710adf8f16c3daddc5b5315e4b9f
parent887f1aa725ed64c3c83aca557bd7bb6588bacaf7
vxlan: Protect against tunnel config where source is not local

Type: fix

If a tunnel's source is not local then post encap VPP will attempt to
receive (via ip4-local) that packet, things go wrong from there.
The fix is when stacking the encap forwarding don't accept a receive
DPO. This approach is taken, rather than rejecting bad tunnels, because
the 'local-ness' of the tunnel's source can change and we can't reject
tunnels that were once correctly configured but are no longer.
the user will quickly discover their mistake as traffic won't pass.

Signed-off-by: Neale Ranns <nranns@cisco.com>
Change-Id: I46198422e321606e8baba003112e978a526b4c2f
src/vnet/vxlan/vxlan.c
test/test_vxlan.py