> On 11 Jan 2001, at 11:47, Jim Reid wrote:
> 
> > >>>>> "ed" == ed  <[EMAIL PROTECTED]> writes:
> > 
> >     ed> This issue is important to me because I teach both dns and
> >     ed> firewall courses. Normally, I would suggest to students that
> >     ed> they block all ports below 1024 (except 53) for packets sent
> >     ed> to the dns server. Now, this data makes me wonder if we're
> >     ed> turning away good guys or bad guys.
> > 
> >     ed> What's the official position on resolvers and ephemeral ports?
> > 
> > I don't think there is one. 
> <snip>
> > And what if a privileged UNIX application uses a port
> > number less than 1024 to query the name server?
> 
> This is a compelling argument. You've convinced me. We
> simply cannot filter dns packets on the source port.
> 
> Thanks,
> 
> Ed
> 
> 

        The nameserver it self has a short list of ports to silently
        reject queries from.  i.e. don't send a query from echo.

        Mark
--
Mark Andrews, Nominum Inc.
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [EMAIL PROTECTED]

Reply via email to