Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 4 Jun 1997 09:08:38 +1000 (EST)
From:      "Daniel O'Callaghan" <danny@panda.hilink.com.au>
To:        Harlan Stenn <Harlan.Stenn@pfcs.com>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: Improvements to rc.firewall? 
Message-ID:  <Pine.BSF.3.91.970604090420.9382C-100000@panda.hilink.com.au>
In-Reply-To: <27736.865360072@mumps.pfcs.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Tue, 3 Jun 1997, Harlan Stenn wrote:

> H> I checked this out by doing a tcpdump of my ppp link, and looked at
> H> all of the DNS traffic.  Responses to my queries came in to *my* port
> H> 53.
> 
> dOc> Are you running your own named locally?  That would be why.
>  
> Yes, I am.  Thanks for the explanation.
> 
> Perhaps we should explain that of somebody wants a working firewall
> they'll have to run a local (caching or forwarding only, even)
> nameserver, too.

It depends on how "working" a firewall you need.  If you don't run a 
local nameserver, you can simply deny all udp packets arriving with src port 
53 which don't come from the name server defined in /etc/resolv.conf.
If you want to run your own caching named, add a forwarder and the word 
'slave' to your /etc/named.boot, and only allow udp src port 53 from your 
forwarder.
If you run your own named, and you don't run it as a slave, you *must* 
accept udp packets with src port 53 and dst port 53 from anyone with 
ipfw. The alternative is to use ipfilter with 'keep state'.

/*  Daniel O'Callaghan                                                     */
/*  HiLink Internet <http://www.hilink.com.au/>;       danny@hilink.com.au  */
/*  FreeBSD - works hard, plays hard...                 danny@freebsd.org  */





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.970604090420.9382C-100000>