Controlling ports used by natd
Barney Wolff
barney at databus.com
Fri Dec 12 22:16:24 PST 2003
On Fri, Dec 12, 2003 at 08:18:11PM -0700, Brett Glass wrote:
> At 07:18 PM 12/12/2003, Barney Wolff wrote:
>
> >In fact, your real problem is with lazy
> >firewalls that can't tell UDP responses from requests. A stateless
> >firewall is an ACL, not a firewall. That works not so badly for TCP
> >but is simply inadequate for UDP.
>
> Not so. A stateful firewall on UDP might keep a worm from getting in,
> but it could still propgagate out. We don't want them getting through
> in either direction (especially since we don't want our users infecting
> one another). So, a full block of the port is appropriate. Especially
> since, in most cases, that port isn't a service that would be safe to use
> across the Net. Ports 135, 137, and 139, for example, should be blocked not
> only because they can spread worms and popup spam but because they
> should not be used on the open Internet.
A stateful firewall is not limited to blocking inbound requests. If
you want to block outbound requests to UDP port 12345, fine. But don't
block a response from port 53 to your host's port 12345, and don't
(if you run a nameserver) block a UDP packet from outside port 12345
to your nameserver's port 53, or the response. A stateful firewall,
sensibly configured, can do all that; an ACL usually can't.
I believe in ACLs and have configured them on every router for which
I've had enable. I also believe in firewalls, for what ACLs can't do.
--
Barney Wolff http://www.databus.com/bwresume.pdf
I'm available by contract or FT, in the NYC metro area or via the 'Net.
More information about the freebsd-net
mailing list