Date: Fri, 03 Dec 1999 13:08:27 +0000 From: Adam Laurie <adam@algroup.co.uk> To: Nate Williams <nate@mt.sri.com>, "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>, John Baldwin <jhb@FreeBSD.ORG>, freebsd-security@FreeBSD.ORG Subject: Re: rc.firewall revisited Message-ID: <3847C0CB.2E9774A@algroup.co.uk> References: <199912021954.LAA74271@gndrsh.dnsmgr.net> <3846FA12.F1480F19@algroup.co.uk> <199912022343.QAA08462@mt.sri.com> <3847ACBE.3D66A556@algroup.co.uk>
index | next in thread | previous in thread | raw e-mail
Adam Laurie wrote:
>
> Nate Williams wrote:
> >
> > > > ipfw add X pass udp from any to ${dnsserver} 53
> > > > ipfw add X+1 pass udp from ${dnsserver} 53 to any
> > > > ipfw add X+2 deny log udp from any to any 53
> > > > ipfw add X+3 dney log udp from any 53 to any
> > >
> > > This breaks one of the basic rules of firewalling... Trusting traffic
> > > based on source address. To quote from the ipfw manual:
> > >
> > > Note that may be dangerous to filter on the source IP address or
> > > source
> > > TCP/UDP port because either or both could easily be spoofed.
> > >
> > > You've just let anyone that can spoof you DNS's source address onto any
> > > UDP port.
And, of course, it also means you are wide open to attack from a
compromised name server. I do not want to trust hosts. I want to trust
specific connections to specific services.
cheers,
Adam
--
Adam Laurie Tel: +44 (181) 742 0755
A.L. Digital Ltd. Fax: +44 (181) 742 5995
Voysey House
Barley Mow Passage http://www.aldigital.co.uk
London W4 4GB mailto:adam@algroup.co.uk
UNITED KINGDOM PGP key on keyservers
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
home |
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3847C0CB.2E9774A>
