On 08-Sep-2008, at 22:50 , zq wrote:

> /* make named use port 53 for the source of all queries, to
> allow
> * firewalls to block all ports except 53:
> */
> query-source port 53;
> query-source-v6 port 53;

This has nothing to do with the problem you're trying to solve, but
someone should point out that this is extremely insecure. If you don't
allow your name server to randomize its query source port, your name
server can be poisoned for any domain in under five minutes.

You can find details of the relevant vulnerability and mitigation
techniques here:

If you have corporate firewalls you need to get around, then you can
do one of two things to improve your security situation:
1) Talk to the firewall administrators and get them to open up
outbound UDP/TCP on all ports from your DNS server. In this case,
restricting ports is actually making your security situation worse,
not better.
2) Forward all queries from this server to a recursive server outside
your firewall that is able to do proper query source port
randomization. There are some notes on doing that here: <http://www.isc.org/sw/bind/docs/forwarding.php

Finally, when you've made changes to fix the situation, you can check
to make sure things are improved by testing your server's source port
randomization. To do that, use dig to cause this server to run a
special query against txtidtest.dns-oarc.net:

dig +short txidtest.dns-oarc.net TXT @your.dns.server