Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 4DD2B200BAF for ; Mon, 31 Oct 2016 09:59:00 +0100 (CET) Received: by cust-asf.ponee.io (Postfix) id 4C51E160B06; Mon, 31 Oct 2016 08:59:00 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 94C83160AF0 for ; Mon, 31 Oct 2016 09:58:59 +0100 (CET) Received: (qmail 90572 invoked by uid 500); 31 Oct 2016 08:58:58 -0000 Mailing-List: contact issues-help@cloudstack.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cloudstack.apache.org Delivered-To: mailing list issues@cloudstack.apache.org Received: (qmail 90562 invoked by uid 500); 31 Oct 2016 08:58:58 -0000 Delivered-To: apmail-incubator-cloudstack-issues@incubator.apache.org Received: (qmail 90557 invoked by uid 99); 31 Oct 2016 08:58:58 -0000 Received: from arcas.apache.org (HELO arcas) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 31 Oct 2016 08:58:58 +0000 Received: from arcas.apache.org (localhost [127.0.0.1]) by arcas (Postfix) with ESMTP id 89FA32C14F9 for ; Mon, 31 Oct 2016 08:58:58 +0000 (UTC) Date: Mon, 31 Oct 2016 08:58:58 +0000 (UTC) From: "ASF GitHub Bot (JIRA)" To: cloudstack-issues@incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Commented] (CLOUDSTACK-9552) KVM Security Groups do not allow DNS over TCP egress MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 archived-at: Mon, 31 Oct 2016 08:59:00 -0000 [ https://issues.apache.org/jira/browse/CLOUDSTACK-9552?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15621660#comment-15621660 ] ASF GitHub Bot commented on CLOUDSTACK-9552: -------------------------------------------- Github user wido commented on the issue: https://github.com/apache/cloudstack/pull/1713 @jburwell I rebased it against 4.9, checks are running now. Regarding Marvin, I have to be honest, I wouldn't know where to start for adding such a test. Do we also have Basic Networking tests at all to test stuff like this? > KVM Security Groups do not allow DNS over TCP egress > ---------------------------------------------------- > > Key: CLOUDSTACK-9552 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-9552 > Project: CloudStack > Issue Type: Bug > Security Level: Public(Anyone can view this level - this is the default.) > Components: KVM > Affects Versions: 4.8.0, 4.9.0 > Environment: KVM Basic Networking > Reporter: Wido den Hollander > Assignee: Wido den Hollander > Labels: dns, dnssec, security-groups > Fix For: Future > > > When egress filtering is configured all outbound traffic is blocked unless configured otherwise. > With the exception that UDP/53 DNS is allowed implicitly by the Security Groups. > Many DNS responses are larger then 4k, with DNSSEC for example and require TCP to be allowed. > The Security Groups should also allow TCP/53 when egress filtering is configured. -- This message was sent by Atlassian JIRA (v6.3.4#6332)