From owner-freebsd-net@FreeBSD.ORG Fri Dec 12 22:16:24 2003 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9285A16A4CE for ; Fri, 12 Dec 2003 22:16:24 -0800 (PST) Received: from pit.databus.com (p70-227.acedsl.com [66.114.70.227]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0EC0D43D31 for ; Fri, 12 Dec 2003 22:16:23 -0800 (PST) (envelope-from barney@pit.databus.com) Received: from pit.databus.com (localhost [127.0.0.1]) by pit.databus.com (8.12.10/8.12.10) with ESMTP id hBD6GMiR045413; Sat, 13 Dec 2003 01:16:22 -0500 (EST) (envelope-from barney@pit.databus.com) Received: (from barney@localhost) by pit.databus.com (8.12.10/8.12.10/Submit) id hBD6GMCZ045412; Sat, 13 Dec 2003 01:16:22 -0500 (EST) (envelope-from barney) Date: Sat, 13 Dec 2003 01:16:22 -0500 From: Barney Wolff To: Brett Glass Message-ID: <20031213061622.GA45267@pit.databus.com> References: <20031212074519.GA23452@pit.databus.com> <6.0.0.22.2.20031212011133.047ae798@localhost> <20031212083522.GA24267@pit.databus.com> <6.0.0.22.2.20031212103142.04611738@localhost> <20031212181944.GA33245@pit.databus.com> <6.0.0.22.2.20031212161250.045e9408@localhost> <20031213001913.GA40544@pit.databus.com> <6.0.0.22.2.20031212175801.04b066d8@localhost> <20031213021813.GA42371@pit.databus.com> <6.0.0.22.2.20031212201423.04a0dec0@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6.0.0.22.2.20031212201423.04a0dec0@localhost> User-Agent: Mutt/1.4.1i X-Scanned-By: MIMEDefang 2.38 cc: net@freebsd.org Subject: Re: Controlling ports used by natd X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Dec 2003 06:16:24 -0000 On Fri, Dec 12, 2003 at 08:18:11PM -0700, Brett Glass wrote: > At 07:18 PM 12/12/2003, Barney Wolff wrote: > > >In fact, your real problem is with lazy > >firewalls that can't tell UDP responses from requests. A stateless > >firewall is an ACL, not a firewall. That works not so badly for TCP > >but is simply inadequate for UDP. > > Not so. A stateful firewall on UDP might keep a worm from getting in, > but it could still propgagate out. We don't want them getting through > in either direction (especially since we don't want our users infecting > one another). So, a full block of the port is appropriate. Especially > since, in most cases, that port isn't a service that would be safe to use > across the Net. Ports 135, 137, and 139, for example, should be blocked not > only because they can spread worms and popup spam but because they > should not be used on the open Internet. A stateful firewall is not limited to blocking inbound requests. If you want to block outbound requests to UDP port 12345, fine. But don't block a response from port 53 to your host's port 12345, and don't (if you run a nameserver) block a UDP packet from outside port 12345 to your nameserver's port 53, or the response. A stateful firewall, sensibly configured, can do all that; an ACL usually can't. I believe in ACLs and have configured them on every router for which I've had enable. I also believe in firewalls, for what ACLs can't do. -- Barney Wolff http://www.databus.com/bwresume.pdf I'm available by contract or FT, in the NYC metro area or via the 'Net.