[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-6820?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14016569#comment-14016569
 ] 

John Kinsella commented on CLOUDSTACK-6820:
-------------------------------------------

Chatted with Daan about this on security@ - doesn't look like this affects the 
security of ACS, so I'm leaving it public.

So - the firewall setup on the SSVMs in general is sort of annoying, in that 
without 
building a new image there’s not currently a way to update those rulesets 
without
manual tweaking. Seems like there should be a default ruleset, with the ability 
to
override the ruleset either per-VM or in general.

Now that I think about it - what seems ideal would be to have an “advanced” 
option 
to instruct a SSVM to connect to a puppet/chef/whatever server to get it’s 
configuration data.

Also - just a reminder to not block all ICMP as a whole. Block echo/reply and
the time-realted messages if you wish, but you want things like MTU negotiation 
to go through.

> VPC router ICMP acl
> -------------------
>
>                 Key: CLOUDSTACK-6820
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-6820
>             Project: CloudStack
>          Issue Type: Improvement
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>          Components: Virtual Router
>    Affects Versions: 4.3.0
>            Reporter: Thijs Houtenbos
>            Priority: Minor
>              Labels: security
>
> There is a default allow icmp any any on the VPC router vm which cannot be 
> controlled with the network ACLs. This makes it impossible to block certain 
> icmp traffic.
> root@r-4135-VM:~# iptables -L -v | grep icmp
> 10784  901K ACCEPT     icmp --  any    any     anywhere             anywhere



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to