Jeromy
"Jeromy" <jero...@hotmail.com> wrote in message
news:eTl76AGe...@TK2MSFTNGP11.phx.gbl...
Jeromy
"Simon Geary" <simon...@hotmail.com> wrote in message
news:eYLiPLGe...@TK2MSFTNGP09.phx.gbl...
UDP port 53 is *typically* used for name resolution. TCP port 53 can also
be used for name resolution if the data is too large to send via UDP.
TCP port 53 is also used for zone transfers.
"Simon Geary" <simon...@hotmail.com> wrote in message
news:eYLiPLGe...@TK2MSFTNGP09.phx.gbl...
--
William Stacey, DNS MVP
"Simon Geary" <simon...@hotmail.com> wrote in message
news:eYLiPLGe...@TK2MSFTNGP09.phx.gbl...
"William Stacey" <sta...@mvps.org> wrote in message
news:ODTaSaHe...@TK2MSFTNGP10.phx.gbl...
I hate opening the whole range to my DNS server. So I tried the
SendsOnDnsPort reg key and set it to 53 (supposedly to force it to use only
53), but that didn't work either.
If anyone else has a suggestion to this, be glad to entertain it, otherwise,
stuck with the whole range.
--
Regards,
Ace
Please direct all replies to the newsgroup so all can benefit.
Ace Fekay, MCSE 2000, MCSE+I, MCSA, MCT, MVP
Microsoft Windows MVP - Active Directory
--
=================================
"Jeromy" <jero...@hotmail.com> wrote in message
news:eTl76AGe...@TK2MSFTNGP11.phx.gbl...
<URL:http://homepages.tesco.net./~J.deBoynePollard/FGA/dns-shaped-firewall-holes.html>
Microsoft's DNS client (in Windows NT, at least - DOS+Windows is different)
doesn't discard such responses, unless the "QueryIpMatching" setting is
enabled as per CERT vulnerability note VU#458659, but most other DNS clients
do. Given the facts that not checking for address mismatches between query
and response DNS/UDP datagrams greatly widens a security vulnerability, and
that such mismatches will also cause interoperability problems anyway; it's
not really worth the effort of accommodating them.
Was that the actual way that you spelled it ? Or did you spell it
"SendOnNonDNSPort" ?
Allowing others to query against your internal DNS could
be a security risk.
>.
>
So I knew I spelled it correctly, not withstanding my misspelling of it in
my post. I restarted the server too, then removed the permit UDP gt 1023
rule. Didn't work. I followed the article. What's confusing is that it says
this is the port it sends to other DNS servers and default is blank, which
means 53. I thought possibly it was the response from my forwarders, but
they're both BIND servers (8.1.2 and 9.2.2).
Any thoughts?
--
Regards,
Ace
Please direct all replies to the newsgroup so all can benefit.
Ace Fekay, MCSE 2000, MCSE+I, MCSA, MCT, MVP
Microsoft Windows MVP - Active Directory
--
=================================
"Jonathan de Boyne Pollard" <J.deBoyn...@Tesco.NET> wrote in message
news:3F6188CE...@Tesco.NET...
I suspected that that was the case.
AF> Any thoughts?
What port was the DNS server actually using in each case ?
Random ports. IIRC, watching my router's logs scrolling by as I was doing
it, 1034, then another, I think 1063. I would need to disable >1023 again to
test it again. I'll let you know after I try it again. It's tough during the
day since I have mulitple production machines requiring resolution. Early
Sunday morning is the best time I've found to test this.