D&C Lug - Home Page
Devon & Cornwall Linux Users' Group

[ Date Index ][ Thread Index ]
[ <= Previous by date / thread ] [ Next by date / thread => ]

Re: [LUG] hi there!!!



kevin bailey wrote:
> 
> how many users are on this list roughly? - and how many are from plymouth?

Loads - I let Chas ponder the numbers.

"From Plymouth" - I fear rather more are "from" Plymouth, than
are currently at Plymouth. But the group started at Plymouth
Uni, so a fair proportion are at Plymouth, but some have
graduated (well they claimed they graduated, but we never saw
any certificates).

> what i'd like to know is this:
> are we a very few who have 'seen a better way' - or is there a huge linux
> community beavering away at honing the OS and apps waiting for our time?

The community is huge, I'm not sure the South West is a hotbed
of open source development, but as I discover darker corners
more come out of the woodwork. To be honest location isn't that
important any more till you want to see a human being (or your
network link is bust).

> on a more technical note - could anyone give me some advice on the best
> ipchains settings for a server which is running the squid proxy server.  what
> is the best way to allow the DNS servers to return their result?  my current
> setup is that all ip packets are DENY'd - and i only allow in packets which i
> need - but i seem to be getting a lot of packets trying to get in with
> different destination port numbers.

Okay DNS is one of those things I do.

First understand DNS servers listen on port 53. Old DNS servers
asked questions on port 53 as well as answered them on 53. New
servers ask questions from the anonymous port range (>1023) and
answer them on 53 (Of course).

So questions go out dnserver:>1023 to any:53

If incoming queries they do any:any to dnsserver:53

Thus if running a caching DNS only (I.E. Not hosting Internet
visible DNS records) you can block incoming to all ports less
than 1024, UDP and TCP (Well maybe mail and stuff is still
needed). SQUID I assume also uses the anonymous port range when
passing on requests.

I always recommend BIND9 with chroot (dead easy in BIND9). If
you run this on the proxy, then it can answer questions for
other internal servers, or perhaps the other internal servers
don't need DNS.

BIND can use listen-on to only listen on appropriate interfaces,
unless you run a DNS server there is usually no reason to listen
on the Internet interface so drop in;

listen-on { 127.0.0.1; 192.168.12.12; }; to only listen on port
53 on private (and loopback) interfaces. Just in case you get
the ipchains rules wrong !!!!- similarly BIND 9 rndc control
channel should listen on 127.0.0.1 only in most cases - but I
think thats the default, I always code it just in case.

If you choose to forward queries to your ISPs DNS servers,
faster but less reliable, then you can restrict the ipchain
rules to....

dnsserver:>1023 to ISPDNSserver(s):53

Remember DNS uses TCP and UDP, some people seem to be under the
misapprehension that TCP is not needed. At least one OS had a
TCP only resolver.....

Hope that helps - a certain amount of lost DNS packets, and
worms probing your port 53 is to be expected. BIND versions
prior to 8.2.3 have known security issues - don't run them, and
a few worms are still crawling around.

Get stuck - drop us an e-mail.

Do get the dshield ipchains log submission script from
www.dshield.org and join the war on scanners, worms and other
vermin.....

If still unsure post the "suspect" ipchain log entries and we'll
make a guess at what they are doing.....

	HTH

	Simon

-- 
Are you using the Internet to best effect ? www.eighth-layer.com
Tel: +44(0)1395 232769      ICQ: 116952768
Moderated discussion of teleworking at news:uk.business.telework

--
The Mailing List for the Devon & Cornwall LUG
Mail majordomo@xxxxxxxxxxxx with "unsubscribe list" in the
message body to unsubscribe.


Lynx friendly