...on 2022-05-16 17:57:06, Stuart Henderson wrote:

 > On 2022-05-16, Alexander Bochmann <[email protected]> wrote:
 > > I seem to remember firewall rules that allowed only udp/53 as _source_ 
 > > port 
 > > for DNS traffic.
 > Such rules often existed to cover replies, before the days
 > of stateful firewalls.

I admit this is rather useless trivia, but a copy of an old (1999)
ORA bookshelf CD with the DNS & BIND book has this:

 > BIND 4 name servers always send queries from port 53, the well-known port 
 > for DNS servers, to port 53. Resolvers, on the other hand, usually send 
 > queries from high-numbered ports (above 1023) to port 53. Though name 
 > servers clearly have to send their queries to the DNS port on a remote host, 
 > there's no reason they have to send the queries from the DNS port. And, 
 > wouldn't you know it, BIND 8 name servers don't send queries from port 53 by 
 > default. Instead, they send queries from high-numbered ports, same as 
 > resolvers do.
 > 
 > This can cause problems with packet filtering firewalls that have been 
 > configured to allow server-to-server traffic but not resolver-to-server 
 > traffic, because they typically expect server-to-server traffic to originate 
 > from port 53 and terminate at port 53.

Also some old NFS servers required that client traffic originated 
from ports < 1024 in order to "prove" that the client service 
was running with root privileges. I assume that some other stuff 
worked on that kind of heuristics too, but I don't remember about 
any good examples.

Alex.

Reply via email to