Return-Path: X-Original-To: apmail-cloudstack-issues-archive@www.apache.org Delivered-To: apmail-cloudstack-issues-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 1A802172F4 for ; Mon, 15 Jun 2015 11:21:01 +0000 (UTC) Received: (qmail 80432 invoked by uid 500); 15 Jun 2015 11:21:00 -0000 Delivered-To: apmail-cloudstack-issues-archive@cloudstack.apache.org Received: (qmail 80401 invoked by uid 500); 15 Jun 2015 11:21:00 -0000 Mailing-List: contact issues-help@cloudstack.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cloudstack.apache.org Delivered-To: mailing list issues@cloudstack.apache.org Received: (qmail 80255 invoked by uid 500); 15 Jun 2015 11:21:00 -0000 Delivered-To: apmail-incubator-cloudstack-issues@incubator.apache.org Received: (qmail 80248 invoked by uid 99); 15 Jun 2015 11:21:00 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 15 Jun 2015 11:21:00 +0000 Date: Mon, 15 Jun 2015 11:21:00 +0000 (UTC) From: "Wido den Hollander (JIRA)" To: cloudstack-issues@incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Created] (CLOUDSTACK-8559) Source address spoofing prevention in Basic Networking only done for DNS MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 Wido den Hollander created CLOUDSTACK-8559: ---------------------------------------------- Summary: Source address spoofing prevention in Basic Networking only done for DNS Key: CLOUDSTACK-8559 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-8559 Project: CloudStack Issue Type: Bug Security Level: Public (Anyone can view this level - this is the default.) Components: KVM Reporter: Wido den Hollander Assignee: Wido den Hollander Looking at the security group rules being programmed for Instances it seems that we only drop spoofed traffic when it's for DNS: if vm_ip is not None: execute("iptables -A " + vmchain_default + " -m physdev --physdev-is-bridged --physdev-in " + vif + " -m set --set " + vmipsetName + " src -p udp --dport 53 -j RETURN ") execute("iptables -A " + vmchain_default + " -m physdev --physdev-is-bridged --physdev-in " + vif + " -m set --set " + vmipsetName + " src -j " + vmchain_egress) I think that we can drop ALL packets which do not match any of the IPs in the list. I don't see a valid reason why we only do this for DNS/UDP 53. -- This message was sent by Atlassian JIRA (v6.3.4#6332)