cloudstack-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "ASF GitHub Bot (JIRA)" <>
Subject [jira] [Commented] (CLOUDSTACK-9552) KVM Security Groups do not allow DNS over TCP egress
Date Sun, 06 Nov 2016 19:48:59 GMT


ASF GitHub Bot commented on CLOUDSTACK-9552:

Github user wido commented on the issue:
    LGTMs on this one? Small fix, but would be good for a LTS.

> KVM Security Groups do not allow DNS over TCP egress
> ----------------------------------------------------
>                 Key: CLOUDSTACK-9552
>                 URL:
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the default.) 
>          Components: KVM
>    Affects Versions: 4.8.0, 4.9.0
>         Environment: KVM Basic Networking
>            Reporter: Wido den Hollander
>            Assignee: Wido den Hollander
>              Labels: dns, dnssec, security-groups
>             Fix For: Future
> When egress filtering is configured all outbound traffic is blocked unless configured
> With the exception that UDP/53 DNS is allowed implicitly by the Security Groups.
> Many DNS responses are larger then 4k, with DNSSEC for example and require TCP to be
> The Security Groups should also allow TCP/53 when egress filtering is configured.

This message was sent by Atlassian JIRA

View raw message