Quilkin should drop packets that are sent from itself. #320
Labels
area/networking
Related to networking I/O
area/security
Issues pertaining to security
help wanted
Extra attention is needed
kind/bug
Something isn't working
priority/high
Issues that should be addressed as soon as possible.
Quilkin currently doesn't do any checking of where the source is from, and the source ip and port can be easily forged, and common version of that forgery is to have the source of the packets also be the destination as the response can be larger than the request (see UDP amplification attacks), so the solution is to ban all traffic that is sourced from itself.
The text was updated successfully, but these errors were encountered: