allowing dig through ipchains
Brad Knowles
brad.knowles at skynet.be
Fri May 18 01:16:49 UTC 2001
At 5:04 PM -0700 5/17/01, George Kallingal wrote:
> This might be a trivial question, but I wanted to know if the dig utility
> uses TCP/UDP port 53 when performing queries. I am running bind 8.2.3 on RH
> 6.2 with ipchains as a firewall.
As a source port? No. Like any user-level application, dig will
use a randomly assigned high-numbered source port, although obviously
the target port will have to be 53. By default, it will use UDP, but
you can request that it use TCP instead.
--
Brad Knowles, <brad.knowles at skynet.be>
/* efdtt.c Author: Charles M. Hannum <root at ihack.net> */
/* Represented as 1045 digit prime number by Phil Carmody */
/* Prime as DNS cname chain by Roy Arends and Walter Belgers */
/* */
/* Usage is: cat title-key scrambled.vob | efdtt >clear.vob */
/* where title-key = "153 2 8 105 225" or other similar 5-byte key */
dig decss.friet.org|perl -ne'if(/^x/){s/[x.]//g;print pack(H124,$_)}'
More information about the bind-users
mailing list