[
https://issues.apache.org/jira/browse/CLOUDSTACK-5494?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14042114#comment-14042114
]
Nux edited comment on CLOUDSTACK-5494 at 6/24/14 1:51 PM:
----------------------------------------------------------
This is still causing problems (received the other day complains that my VR was
used in a DNS reflection attack). Here's a quick hack to "fix" it in ADV+SG
zone (and likely in Basic zone as well). Run this from VR's rc.local:
http://pastebin.com/raw.php?i=6C53WUg3
(moved the commands in pastebin as confluence messed them up)
was (Author: nuxro):
This is still causing problems (received the other day complains that my VR was
used in a DNS reflection attack). Here's a quick hack to "fix" it in ADV+SG
zone (and likely in Basic zone as well). Run this from VR's rc.local:
# allow DNS queries only from our public ranges, we determine this by looking
at the rule for port 8080 access
for i in `iptables-save |grep 8080|awk '{print $4}'`; do iptables -I INPUT -s
$i -p tcp -m tcp --dport 53 -j ACCEPT; iptables -I INPUT -s $i -p udp -m udp
--dport 53 -j ACCEPT; done
# remove the rule that accepts requests from everyone
iptables -D INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
iptables -D INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT
> the dns resolver servers on the VRs are open to the world
> ---------------------------------------------------------
>
> Key: CLOUDSTACK-5494
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5494
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the
> default.)
> Affects Versions: 4.2.0, 4.3.0
> Reporter: Wei Zhou
> Assignee: Jayapal Reddy
> Priority: Critical
> Labels: security
> Fix For: Future
>
>
> Currently the port 53 (tcp and udp) on virtual routers are open, so everyone
> on the internet can visit the dns service on virtual routers. This may cause
> overload and security issue.
--
This message was sent by Atlassian JIRA
(v6.2#6252)