Hello,

My thanks to you both for the info.  Yes, I am referring only to inbound 
queries from the Great Unknown (GU).  My DNS system is essentially a 
split-DNS with the internal DNS server passing requests to the firewall DNS 
server.  It in turn, makes the requests to the world.  The firewall server 
is authoritative for our domain, and only contains a few entries we wish 
exposed.  Zone transfer requests are limited to our ISPs servers.

I wonder if, since our server will never return a packet large enough to 
warrant requiring a tcp response to the query, I even need to allow inbound 
(from the GU) tcp DNS requests from servers other than our ISPs servers - 
or is it considered good practice to generallyt allow inbound udp _and_ tcp 
requests and let the DNS server worrying about who is allowed to initiate a 
zone transfer?

> > > > Allow ANY source port for your DNS queries.

Concensus seems to indicate that allowing queries from the GU with any 
source port to udp port 53 on the DNS server are okay.  I had restricted it 
earlier to just 53 and 1024:65535, but given the report of Firewall-1 
rewriting packets with source port 53 to something like 512 or so, I see 
the requirement to allow this (although, I've not seen these types of 
denied packets in my logs to date).

Cheers!
Jon
-----------------------------------------------------------------
Jon Earle                       (613) 612-0946 (Cell)
HUB Computer Consulting Inc.    (613) 830-1499 (Office)
http://www.hubcc.ca             1-888-353-7272 (Within Canada/US)

"God does not subtract from one's alloted time on Earth,
those hours spent flying."       --Unknown

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to