[
https://issues.apache.org/jira/browse/CLOUDSTACK-9464?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15430920#comment-15430920
]
ASF GitHub Bot commented on CLOUDSTACK-9464:
--------------------------------------------
Github user NuxRo commented on the issue:
https://github.com/apache/cloudstack/pull/1653
@jburwell I am afraid I do not have the coding skills to do what you want
re that variable, I am just submitting @ustcweizhou's code from that Jira issue.
Right now basic/sg zones are vulnerable to this and need manual patching,
so it must be a regression I guess.
I've opened a new issue:
https://issues.apache.org/jira/browse/CLOUDSTACK-9464
> VR vulnerable to DNS reflection attack
> --------------------------------------
>
> Key: CLOUDSTACK-9464
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9464
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the
> default.)
> Components: Virtual Router
> Affects Versions: 4.8.0, 4.9.0
> Environment: Advanced zones with Security Groups
> Reporter: Nux
> Labels: ddos, dns, security, virtualrouter
>
> In advanced zones with Security Groups and probably Basic Zones, too, the VR
> opens the DNS service to everyone (-j ACCEPT).
> As a result Cloudstack VRs are currently used in DNS reflection or
> amplification attacks.
> There is some discussion about this in
> https://issues.apache.org/jira/browse/CLOUDSTACK-6432
> This PR tries to rectify the problem:
> https://github.com/apache/cloudstack/pull/1653
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)