Date: Fri, 3 Dec 1999 09:53:59 -0700 From: Nate Williams <nate@mt.sri.com> To: Adam Laurie <adam@algroup.co.uk> Cc: Nate Williams <nate@mt.sri.com>, "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>, John Baldwin <jhb@FreeBSD.ORG>, freebsd-security@FreeBSD.ORG Subject: Re: rc.firewall revisited Message-ID: <199912031653.JAA11157@mt.sri.com> In-Reply-To: <3847F47B.834A27AE@algroup.co.uk> References: <199912021954.LAA74271@gndrsh.dnsmgr.net> <3846FA12.F1480F19@algroup.co.uk> <199912022343.QAA08462@mt.sri.com> <3847ACBE.3D66A556@algroup.co.uk> <199912031600.JAA10966@mt.sri.com> <3847F47B.834A27AE@algroup.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
> > > This simply stops traffic that's pretending to be your internal network > > > coming in from the outside, and vice versa. It does not help with other > > > networks being spoofed. > > > > True, but neither did the rules you (?) proposed previously. The rules > > Rod listed limited the packets to come/go *only* from the internal DNS > > server on the network, so in no way makes it any worse that what was > > proposed, and only makes it better. However, they require more > > knowledge of the external IP address of the box as well as the external > > interface, along with the internal IP addresses. > > I disagree. My rule blocks traffic to UDP ports that are required to be > protected, regardless of where they come from. Rod's rules allow the > name server to connect to ANY UDP port. That is the problem. You mis-read them, read them again. ipfw add X pass udp from any to ${dnsserver} 53 ipfw add X+1 pass udp from ${dnsserver} 53 to any ipfw add X+2 deny log udp from any to any 53 ipfw add X+3 dney log udp from any 53 to any The DNS server is only allowed to send packets *from* port 53 to any port (which it must because the request comes from random ports). As long as we don't allow 'spoofed' traffic to appear to be coming from $dnsserver, this is a very safe set of rules (although incomplete, as Rod points out). Nate To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199912031653.JAA11157>