allowing dig through ipchains

Brad Knowles brad.knowles at skynet.be
Fri May 18 01:16:49 UTC 2001


At 5:04 PM -0700 5/17/01, George Kallingal wrote:

>  This might be a trivial question, but I wanted to know if the dig utility
>  uses TCP/UDP port 53 when performing queries.  I am running bind 8.2.3 on RH
>  6.2 with ipchains as a firewall.

	As a source port?  No.  Like any user-level application, dig will 
use a randomly assigned high-numbered source port, although obviously 
the target port will have to be 53.  By default, it will use UDP, but 
you can request that it use TCP instead.

-- 
Brad Knowles, <brad.knowles at skynet.be>

/*        efdtt.c  Author:  Charles M. Hannum <root at ihack.net>          */
/*       Represented as 1045 digit prime number by Phil Carmody         */
/*     Prime as DNS cname chain by Roy Arends and Walter Belgers        */
/*                                                                      */
/*     Usage is:  cat title-key scrambled.vob | efdtt >clear.vob        */
/*   where title-key = "153 2 8 105 225" or other similar 5-byte key    */

dig decss.friet.org|perl -ne'if(/^x/){s/[x.]//g;print pack(H124,$_)}'


More information about the bind-users mailing list