Date: Thu, 22 Feb 2001 21:23:26 +0200 From: "Timothy S. Bowers" <security@nol.co.za> To: "Geoffrey T. Falk" <gtf@cirp.org> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Best way for one-way DNS traffic Message-ID: <4.3.2.7.2.20010222211944.00b41350@nol.co.za> In-Reply-To: <200102221907.MAA57960@h-209-91-79-2.gen.cadvision.com> References: <Pine.BSF.4.33.0102212230430.57938-100000@ashburn.skiltech.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>"Set up your DNS as a forwarder to your upstream provider's nameserver." Lets say 196.25.1.1 was your upstream provider would you configure it like this: forwarders { 196.25.1.1; }; ..and I guess if you are hosting reverse IP lookup entries and other domain names you can't do this can you ? At 12:07 PM 2/22/01 -0700, Geoffrey T. Falk wrote: >On 22 Feb, H. Wade Minter wrote: > > My gateway box is running a name server for my home network. Internal > > clients point to the gateway box for DNS service, and the gateway goes out > > and resolves DNS queries. > > > > I've also got an ipfw firewall on the gateway. What I'd like to do is > > make it so internal DNS works like it should, but nobody on the outside > > should be able to connect to port 53.sadm@unired.net.pe > > >Set up your DNS as a forwarder to your upstream provider's nameserver. >Block all inbound traffic on UDP port 53, except from your ISP's >nameserver. Set up your local zone files also. > >This still leaves you open to DoS from someone forging your upstream >provider's IP address. But by blocking source routed packets you can >ensure that nobody else can query your nameserver. > >g. > > > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20010222211944.00b41350>