--On Tuesday, 04 April, 2000 20:22 -0700 [EMAIL PROTECTED] wrote:

> On 04/04/2000 at 21:09:42 EST, Bill Lavalette noc/sec Administrator
> <[EMAIL PROTECTED]> wrote:
>> TCP 53 you would want to reject zone transfers from unauthorized  hosts
>> this is one of the single most "doh's!! " when setting DNS security a
> would
>> be attacker wouldn't even have to scan a class c to get the recon info
>> he needs to launch assaults. it would be all mapped out for him/her in a
> nice
>> neat zone file.
>
> Zone transfers should be blocked (if you want to do this) with directives
> to your dns server code (ususally bind).  It shouldn't be done by
> blocking 53/tcp.
>
> Blocking tcp blocks legitimate, non-zone-transfer dns traffic.  Do you
> really want to do this?  Not only will your setup be violating rfcs, but
> some clients or applications simply may not be able to use your site.  (I
> suspect there are folks that will say that they don't allow 53/tcp and it
> doesn't seem to be hurting anything.  Maybe they should more closely
> investigate their firewall logs and complaints from external users.)

its potentially worse than that: if, for whatever reason, things get too 
large
(as paul robertson implied), then things would stop working. that might not
be desirable.

-paul

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to