Re: DNS amplification attack to CloudStack VR running dnsmasq

2014-12-15 Thread Andrija Panic
you got response with BUGs on jira and temp fix is there... so, yes On 15 December 2014 at 13:49, Indra Pramana wrote: > > Hi Andrija, > > Yes, it's on a shared network with public IP in advanced zone. So far I > don't see similar issues on my VPC's VRs, but it could be because the IP is > not kn

Re: DNS amplification attack to CloudStack VR running dnsmasq

2014-12-15 Thread Indra Pramana
Hi Andrija, Yes, it's on a shared network with public IP in advanced zone. So far I don't see similar issues on my VPC's VRs, but it could be because the IP is not known, unlike the VR on a shared network which will automatically use the second IP on the subnet after the gateway (e.g. x.x.x.2). I

Re: DNS amplification attack to CloudStack VR running dnsmasq

2014-12-15 Thread Wei ZHOU
Please look at the comments for CLOUDSTACK-5494 and CLOUDSTACK-6432 on JIRA. Maybe it helps. -Wei 2014-12-15 13:13 GMT+01:00 Indra Pramana : > Dear all, > > We are using CloudStack 4.2.0 with KVM hypervisors. > > Is there a way to prevent our virtual routers (VRs) to be targeted by DNS > amplifi

Re: DNS amplification attack to CloudStack VR running dnsmasq

2014-12-15 Thread Jayapal Reddy Uradi
Please refer the following ticket, It will help https://issues.apache.org/jira/browse/CLOUDSTACK-5494 Thanks, jayapal On 15-Dec-2014, at 5:52 PM, Andrija Panic wrote: > Indra, did you observe this on Shared Network - I had same issue with > Shared Network (public IPs) in Advanced Zone. > > I

Re: DNS amplification attack to CloudStack VR running dnsmasq

2014-12-15 Thread Andrija Panic
Indra, did you observe this on Shared Network - I had same issue with Shared Network (public IPs) in Advanced Zone. I think VR for VPC is NOT a problem... On 15 December 2014 at 13:13, Indra Pramana wrote: > > Dear all, > > We are using CloudStack 4.2.0 with KVM hypervisors. > > Is there a way t

DNS amplification attack to CloudStack VR running dnsmasq

2014-12-15 Thread Indra Pramana
Dear all, We are using CloudStack 4.2.0 with KVM hypervisors. Is there a way to prevent our virtual routers (VRs) to be targeted by DNS amplification attack? It seems that the DNS services on dnsmasq running on the VRs are by default recursive, causing it to easily be targeted for DNS amplificati