Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 30 Dec 1998 19:45:25 -0800
From:      Dean <dean@thegrid.net>
To:        Mike Holling <myke@ees.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: ipfw and DNS
Message-ID:  <368AF355.F8AA6397@thegrid.net>
References:  <Pine.BSF.4.03.9812291333110.388-100000@phluffy.fks.bt>

next in thread | previous in thread | raw e-mail | index | archive | help
Mike Holling wrote:

> I have the same question you do about DNS.  One of my clients is using a
> machine to IP masquerade his LAN onto the Internet via DSL link.  His
> provider believes they will be able to successfully keep people from
> "running servers" by monitoring traffic and probing connected machines.
> Thus, they state that if they detect a DNS server running on his machine
> they will charge him $500/mo extra.  Right now the machine is running a
> local caching server for the LAN, and I can't think of any good way to
> keep external machines from querying it while still allowing responses
> from other DNS servers back in. Please let me know if you get any good
> answers.
>
> Thanks,
>
> - Mike

  That is pretty strange.  I can't think of any way to keep the dns server
secret from the network provider.
    I have an idea about keeping malicious packets from a dns server.  I
have a machine with a ppp connection to my service provider (tun0) and a
ethernet on the inside (ed0).  Suppose I ran a dns server on my gateway.  I
could block port 53 on the tun0 side, but allow them on the ed0 side.  The
only udp packets to let through are those originating from 53.  I know that
this isn't the greatest solution because udp packets with a source port of
53 aren't necessarily from a dns server.  Any input on this scheme?  Thanks,

Dean


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?368AF355.F8AA6397>