you got response with BUGs on jira and temp fix is there...
so, yes

On 15 December 2014 at 13:49, Indra Pramana <in...@sg.or.id> wrote:
>
> Hi Andrija,
>
> Yes, it's on a shared network with public IP in advanced zone. So far I
> don't see similar issues on my VPC's VRs, but it could be because the IP is
> not known, unlike the VR on a shared network which will automatically use
> the second IP on the subnet after the gateway (e.g. x.x.x.2).
>
> Is there a way to configure dnsmasq not to response to recursive queries?
>
> Thank you.
>
>
>
> On Mon, Dec 15, 2014 at 8:22 PM, Andrija Panic <andrija.pa...@gmail.com>
> wrote:
> >
> > Indra, did you observe this on Shared Network - I had same issue with
> > Shared Network (public IPs) in Advanced Zone.
> >
> > I think VR for VPC is NOT a problem...
> >
> > On 15 December 2014 at 13:13, Indra Pramana <in...@sg.or.id> wrote:
> > >
> > > Dear all,
> > >
> > > We are using CloudStack 4.2.0 with KVM hypervisors.
> > >
> > > Is there a way to prevent our virtual routers (VRs) to be targeted by
> DNS
> > > amplification attack? It seems that the DNS services on dnsmasq running
> > on
> > > the VRs are by default recursive, causing it to easily be targeted for
> > DNS
> > > amplification attack.
> > >
> > > Any advice on how to overcome this?
> > >
> > > Looking forward to your reply, thank you.
> > >
> > > Cheers.
> > >
> >
> >
> > --
> >
> > Andrija Panić
> >
>


-- 

Andrija Panić

Reply via email to