On Sun, 4 Feb 2001, Michael H. Warfield spewed into the bitstream:
MHW>On Sun, Feb 04, 2001 at 09:53:48PM +0100, Gustav Schaffter wrote:
MHW>> Michael,
MHW>
MHW>> I run a caching DNS and it's of course authoritative for my internal
MHW>> private network. (Where I use the .home TLD. Shouldn't get any requests
MHW>> for that domain, I believe.)
MHW>
MHW>    Hmmm...  Probably true...  I'll have to think about that a bit.
MHW>
MHW>> "Michael H. Warfield" wrote:
MHW>> <multiple snips>
MHW>
MHW>> > > Any idea of why I get so many packets on port 53? DENY'd so far, but...
MHW>
MHW>> >         TCP or UDP?  Both are used by DNS but for generally different tasks.
MHW>
MHW>> The traffic I'm receiving is udp.
MHW>
MHW>    Ok...  So normal DNS traffic.
MHW>
MHW>> >         You should not be seeing TCP traffic on 53 unless requests are
MHW>> > larger than what can be handled in a single UDP packet.  Those are
MHW>> > typically zone transfers and you probably don't want that.
MHW>
MHW>> Is there anywhere I can restrict who can request a zone transfer? (I do
MHW>> run a secondary DNS in my little network. ;-)
MHW>
MHW>    Yes...
MHW>
MHW>    You don't say what version Bind you are running but I would assume
MHW>(hope) it's at least Bind 8.2.3.  There are security advisories out on
MHW>anything and everything less.  (Well Bind 4.9.8 is said to be safe but
MHW>4.x is deprecated and nobody should be using it anyways).
MHW>
MHW>    In Bind 8.x and Bind 9.x you restrict who can request a zone
MHW>transfer with the "allow-transfer" stanza in the configuration file.
MHW>
MHW>    Here's an example from the O'Reilly Book "DNS and BIND" (3rd ed,
MHW>p 252):
MHW>
MHW>zone "acmebw.com" {
MHW>    type master;
MHW>    file "db.acmebw";
MHW>    allow-transfer {
MHW>            192.168.0.1;
MHW>            192.168.1.1;
MHW>    };
MHW>};
MHW>
MHW>> If I understand your reasoning I should probably accept all incoming udp
MHW>> from port 53 to any unprivileged port, no matter what the source address
MHW>> is?
MHW>
MHW>    Probably.  You can also set up your name servers to be "forwarding
MHW>only".  That way they will ONLY ever talk to their forwarding servers and
MHW>never try to contact other name servers on their own.  That's described on
MHW>page 246 of the same book above.  You would use something like this:
MHW>
MHW>options {
MHW>    forwarders {
MHW>            192.249.249.1;
MHW>            192.249.249.3;
MHW>    };
MHW>    forward-only;
MHW>}
MHW>
MHW>    That tightens the restrictions on where your name server will go
MHW>with a request and will limit DNS communications between it and the
MHW>specified forwarders only.  Then you just limit your clients to only
MHW>talk to your restricted forwarding-only name server (by only putting that
MHW>address in the resolve.conf files) and you should be set.

Here's some more sample stuff to help out:

// BIND configuration file
// created by Chuck Mead on 31 Aug 00
// last edited 3 Feb 2001

options {
                version "Not today!";
                directory "/var/named";
                pid-file  "/var/named/named.pid";
                statistics-interval 0;
                interface-interval 0;
};

acl "secondary" {
                127.0.0.0/8;
                xxx.xxx.xxx.xxx/32;
                xxx.xxx.xxx.xxx/32;
};

logging {
                category lame-servers { null; };
};

zone "mysample.com" {
        type master;
        file "primary/db.mysample";
        allow-query { any; };
        allow-update { none; };
        allow-transfer { secondary; };
};

--
Chuck Mead, Owner, MoonGroup.com
[EMAIL PROTECTED] (Note: all html email sent to me is deleted unread)
GnuPG Public Key Available: http://wwwkeys.us.pgp.net



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to