-----Original Message----- From: netfilter-admin@xxxxxxxxxxxxxxxxxxx [mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of cldavis@xxxxxxxxxxxxx Sent: Wednesday, May 12, 2004 6:40 PM To: netfilter@xxxxxxxxxxxxxxxxxxx Subject: Re: pop3 and dns > -----Original Message----- > From: Dick St.Peters [mailto:stpeters@xxxxxxxxxxxxx] > Sent: Wednesday, May 12, 2004 09:21 PM > To: 'Cedric Blancher' > Cc: 'Netfilter Mailing List' > Subject: Re: pop3 and dns > > Cedric Blancher writes: > > Le mer 12/05/2004 à 21:14, Dana Bourgeois a écrit : > > > >>tcp for zone transfers > > > > and large answers ... > > > ...where a 'large answer' is usually taken to be a UDP packet of > > > more than 512 bytes. > > > > I don't quite understand the meaning of this answer... So, I clarify. > > > > When a DNS server has to reply on UDP with more than 512 bytes of > > data, it sends back an answer with TC bit (truncated) set to let > > client know answer is not complete and have him send it again using TCP. > > To add my own bit of clarification, it's not large answers that need > TCP open, it's requests that have large answers. If the client gets a > UDP answer with the TC bit set, it should send the query again using a > TCP connection ... and the server must listen for such connections ... > and its firewall must let them through. <snip> In following this post... I currently only allow port 53/udp through my wall for dns. I haven't noticed many In the even that someone is able to comprimise a dns server, what would be the best way to restrict tcp zone transfers at the firewall? Rate limiting comes to my mind, any suggestions on the actual limits? Other suggestions? Thanks! Christopher Davis Christopher - You should never rely on your firewall to restrict zone transfers. You should create an ACL in your named.conf file for hosts permitted to request zone transfers, and then apply this against the allow-transfers parameter. Example below: # Allow zone transfers from these name servers acl "xfers" { 192.168.1.1; 192.168.2.1; localhost; }; ########################## # ZONE TRANSFER ########################## # Only allow hosts in the "xfers" acl do zone transfers allow-transfer { xfers; };