You'll want to allow tcp/53 if doing any sort of public dns - anything greater than 1500 bytes (ie most domain-keys//spf records), and also any anomaly mitigation gear (the things that keep 400gb DDoS at bay) use that to figure our if you're real or not. Blocking tcp for dns is not a good idea as a whole, it's just RFC-compliant behavior things expect. -mb On 12/07/2014 09:17 PM, der.hans wrote: > BTW, also firewall TCP port 53 to only allow connections from your slaves > unless you're certain you really want it open. > > ciao, > > der.hans --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org To subscribe, unsubscribe, or to change your mail settings: http://lists.phxlinux.org/mailman/listinfo/plug-discuss