Can't someone choose source port?
Hi all,
I have the following problem in my firewall setup.
I want to ping and traceroute from the firewall, and I decided
to allow DNS lookup from my firewall. (I use my ISP DNSs).
So I added the following rule on the input chain (or more
precisely on the input chain from the outside world):
ipchains -A bad-if -p TCP --sport domain -j ACCEPT
I'm wondering if such a rule isn't very dangerous in fact.
Suppose that a port (say telnet) is open on the firewall,
so that I can telnet from inside, but blocked for the
outside world. Isn't it possible to hack a telnet client
so that it connects FROM port 53 (domain) to my telnet port?
If so, what should I do? Should I specify that I only allow
packet coming from port 53 _and_ from the addresses of
my ISP DNSs? Even in this case, I would have to trust these
computers. Is there a really bullet-proof setup?
Thanks for your time.
Sincerely.
Julien Stern
Reply to: