Subject: Re: DNS-based firewalling?
To: Florian Stoehr <netbsd@wolfnode.de>
From: Johnny Billquist <bqt@Update.UU.SE>
List: netbsd-users
Date: 01/10/2005 14:40:33
On Mon, 10 Jan 2005, Florian Stoehr wrote:

> On Mon, 10 Jan 2005, Johnny Billquist wrote:
>
>> On Mon, 10 Jan 2005, Michael Smith wrote:
>> 
>>> On Mon, 10 Jan 2005 00:35:29 +0100 (CET)
>>> Florian Stoehr <netbsd@wolfnode.de> wrote:
>>> 
>>>> I want a "you won't even connect at SMTP" solution in that case
>>> 
>>> I don't think it is a good idea to do a DNS lookup while filtering 
>>> packets, and judging from the other responses it may not be doable anyway.
>>> 
>>> How about using your smtp daemon to build a list of IP addresses which you 
>>> don't want to accept connections from and using pf to filter subsequent 
>>> connections attempts?
>> 
>> Since noone have mentioned /etc/hosts.deny yet, I'll do it.
>> Simple, you can do it based on hostnames or ip-address ranges, and while I 
>> think you do get through the connect stage, the port is immediately 
>> disconnected again.
>> 
>> 	Johnny
>> 
>> Johnny Billquist                  || "I'm on a bus
>>                                  ||  on a psychedelic trip
>> email: bqt@update.uu.se           ||  Reading murder books
>> pdp is alive!                     ||  tryin' to stay hip" - B. Idol
>> 
>
> Hm -> this is a nice way, anyway it only works from inetd.

No, I believe it works for all applications, including sendmail/postfix.

> So I'll put a portforwarder protected by the hosts.deny into inetd and 
> forward "successful" connections to the real SMTP somewhere else then.
>
> Yes, I think this will finally solve it.
>
> Thanks for all replies.

 	Johnny

Johnny Billquist                  || "I'm on a bus
                                   ||  on a psychedelic trip
email: bqt@update.uu.se           ||  Reading murder books
pdp is alive!                     ||  tryin' to stay hip" - B. Idol