[ https://issues.apache.org/jira/browse/CLOUDSTACK-9464?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15430920#comment-15430920 ]
ASF GitHub Bot commented on CLOUDSTACK-9464: -------------------------------------------- Github user NuxRo commented on the issue: https://github.com/apache/cloudstack/pull/1653 @jburwell I am afraid I do not have the coding skills to do what you want re that variable, I am just submitting @ustcweizhou's code from that Jira issue. Right now basic/sg zones are vulnerable to this and need manual patching, so it must be a regression I guess. I've opened a new issue: https://issues.apache.org/jira/browse/CLOUDSTACK-9464 > VR vulnerable to DNS reflection attack > -------------------------------------- > > Key: CLOUDSTACK-9464 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9464 > Project: CloudStack > Issue Type: Bug > Security Level: Public(Anyone can view this level - this is the > default.) > Components: Virtual Router > Affects Versions: 4.8.0, 4.9.0 > Environment: Advanced zones with Security Groups > Reporter: Nux > Labels: ddos, dns, security, virtualrouter > > In advanced zones with Security Groups and probably Basic Zones, too, the VR > opens the DNS service to everyone (-j ACCEPT). > As a result Cloudstack VRs are currently used in DNS reflection or > amplification attacks. > There is some discussion about this in > https://issues.apache.org/jira/browse/CLOUDSTACK-6432 > This PR tries to rectify the problem: > https://github.com/apache/cloudstack/pull/1653 -- This message was sent by Atlassian JIRA (v6.3.4#6332)