Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upAllow ICMP packets #336
Closed
Allow ICMP packets #336
Comments
|
@larsbergstrom I've moved all slaves to the 'default' group, deleted the spurious 'launch-wizard-x' groups, and allowed ICMP on the default and servo-master groups. When creating new slaves, please put them in the 'default' security group rather than creating a new one. |
|
@edunham Thanks, will do! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Currently, the (AWS?) firewall settings disallow ICMP packets, which makes us bad network citizens. ICMP is useful not only for debugging (ping, traceroute), but is also necessary for features such as path MTU discovery, and blocking ICMP doesn't add any security since we list these IP addresses in DNS anyways.
I would still recommend ICMP rate-limiting to prevent reflection attacks, if it's not too complicated to set up.
cc @edunham