You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@cloudstack.apache.org by "John Burwell (JIRA)" <ji...@apache.org> on 2016/09/19 03:06:20 UTC
[jira] [Updated] (CLOUDSTACK-9464) VR vulnerable to DNS reflection
attack
[ https://issues.apache.org/jira/browse/CLOUDSTACK-9464?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
John Burwell updated CLOUDSTACK-9464:
-------------------------------------
Fix Version/s: 4.8.2.0
4.9.1.0
4.10.0.0
> VR vulnerable to DNS reflection attack
> --------------------------------------
>
> Key: CLOUDSTACK-9464
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9464
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the default.)
> Components: Virtual Router
> Affects Versions: 4.8.0, 4.9.0
> Environment: Advanced zones with Security Groups
> Reporter: Nux
> Labels: ddos, dns, security, virtualrouter
> Fix For: 4.10.0.0, 4.9.1.0, 4.8.2.0
>
>
> In advanced zones with Security Groups and probably Basic Zones, too, the VR opens the DNS service to everyone (-j ACCEPT).
> As a result Cloudstack VRs are currently used in DNS reflection or amplification attacks.
> There is some discussion about this in https://issues.apache.org/jira/browse/CLOUDSTACK-6432
> This PR tries to rectify the problem:
> https://github.com/apache/cloudstack/pull/1653
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)