On Mon, Jan 31, 2000 at 02:35:38PM +0100, Julien Stern wrote:
> So I added the following rule on the input chain (or more
> precisely on the input chain from the outside world):
> 
> ipchains -A bad-if -p TCP --sport domain -j ACCEPT
> 
> I'm wondering if such a rule isn't very dangerous in fact.
> Suppose that a port (say telnet) is open on the firewall,
> so that I can telnet from inside, but blocked for the
> outside world. Isn't it possible to hack a telnet client
> so that it connects FROM port 53 (domain) to my telnet port?

Yes, you shoul only allow packets for a exisitng TCP connection to enter
the input rule (! -y).

> If so, what should I do? Should I specify that I only allow
> packet coming from port 53 _and_ from the addresses of
> my ISP DNSs? Even in this case, I would have to trust these
> computers. Is there a really bullet-proof setup?

You can also specify the query-port for bind 8, then you dont have to allow
all ports for the UDP part.

Greetings
Bernd
-- 
  (OO)      -- [EMAIL PROTECTED] --
 ( .. )  [EMAIL PROTECTED],linux.de,debian.org} http://home.pages.de/~eckes/
  o--o     *plush*  2048/93600EFD  [EMAIL PROTECTED]  +497257930613  BE5-RIPE
(O____O)  When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!

Reply via email to