[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-9464?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15430920#comment-15430920
 ] 

ASF GitHub Bot commented on CLOUDSTACK-9464:
--------------------------------------------

Github user NuxRo commented on the issue:

    https://github.com/apache/cloudstack/pull/1653
  
    @jburwell I am afraid I do not have the coding skills to do what you want 
re that variable, I am just submitting @ustcweizhou's code from that Jira issue.
    
    Right now basic/sg zones are vulnerable to this and need manual patching, 
so it must be a regression I guess.
    
    I've opened a new issue:
    
    https://issues.apache.org/jira/browse/CLOUDSTACK-9464


> VR vulnerable to DNS reflection attack
> --------------------------------------
>
>                 Key: CLOUDSTACK-9464
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9464
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>          Components: Virtual Router
>    Affects Versions: 4.8.0, 4.9.0
>         Environment: Advanced zones with Security Groups 
>            Reporter: Nux
>              Labels: ddos, dns, security, virtualrouter
>
> In advanced zones with Security Groups and probably Basic Zones, too, the VR 
> opens the DNS service to everyone (-j ACCEPT).
> As a result Cloudstack VRs are currently used in DNS reflection or 
> amplification attacks.
> There is some discussion about this in 
> https://issues.apache.org/jira/browse/CLOUDSTACK-6432
> This PR tries to rectify the problem:
> https://github.com/apache/cloudstack/pull/1653



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to