You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@cloudstack.apache.org by "Nux (JIRA)" <ji...@apache.org> on 2014/06/24 15:52:24 UTC

[jira] [Comment Edited] (CLOUDSTACK-5494) the dns resolver servers on the VRs are open to the world

    [ https://issues.apache.org/jira/browse/CLOUDSTACK-5494?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14042114#comment-14042114 ] 

Nux edited comment on CLOUDSTACK-5494 at 6/24/14 1:51 PM:
----------------------------------------------------------

This is still causing problems (received the other day complains that my VR was used in a DNS reflection attack). Here's a quick hack to "fix" it in ADV+SG zone (and likely in Basic zone as well). Run this from VR's rc.local:
http://pastebin.com/raw.php?i=6C53WUg3

(moved the commands in pastebin as confluence messed them up)


was (Author: nuxro):
This is still causing problems (received the other day complains that my VR was used in a DNS reflection attack). Here's a quick hack to "fix" it in ADV+SG zone (and likely in Basic zone as well). Run this from VR's rc.local:

#  allow DNS queries only from our public ranges, we determine this by looking at the rule for port 8080 access
for i in `iptables-save |grep 8080|awk '{print $4}'`; do iptables -I INPUT -s $i -p tcp -m tcp --dport 53 -j ACCEPT; iptables -I INPUT -s $i -p udp -m udp --dport 53 -j ACCEPT; done
# remove the rule that accepts requests from everyone
iptables -D INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT
iptables -D INPUT -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT



> the dns resolver servers on the VRs are open to the world
> ---------------------------------------------------------
>
>                 Key: CLOUDSTACK-5494
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5494
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the default.) 
>    Affects Versions: 4.2.0, 4.3.0
>            Reporter: Wei Zhou
>            Assignee: Jayapal Reddy
>            Priority: Critical
>              Labels: security
>             Fix For: Future
>
>
> Currently the port 53 (tcp and udp) on virtual routers are open, so everyone on the internet can visit the dns service on virtual routers. This may cause overload and security issue.



--
This message was sent by Atlassian JIRA
(v6.2#6252)