From: mouss on
Jonathan Tripathy a écrit :
>
>> I am not a Xen expert, but AFAICT, you can configure iptables in the VM
>> and in the host.
>>
>> note that I am not saying you should do that. it really depends on your
>> setup. if you can script the work to implement "centralized" admin, then
>> it may be worth the pain.
>>
> Yeah, I'm using to scripting iptables upon VM boot and shutdown for
> customers, so setting this up for iptables should be ok. Xen makes life
> so much easier by giving each VM an interface, so you can filter based
> on that.
>>
>>> So you think given this, that placing the mail sever in the DMZ is ok
>>> then?
>>>
>>>
>> sure it is. as already recommended, you can use VLAN to implement
>> logical segmentation inside a zone (provided your VLAN implementation
>> can't be circumvented. remember, this is only logical...).
>>
> Think it would be ok if I didn't use VLAN segmentation, but just used
> iptables between hosts? I think this would nearly achieve the same thing...

these are different things. VLAN is about ethernet. iptables/pf is about
IP.

anyway, I think we're OT here since some posts, so let's not annoy other
members. feel free to contact me offlst if needed/appropriate.

From: Randy Ramsdell on
mouss wrote:
> Simone Caruso a �crit :
>
>> Il 19/07/2010 22:04, Jonathan Tripathy ha scritto:
>>
>>> On 19/07/10 18:07, Angelo Amoruso wrote:
>>>
>>>> On 16/07/2010 10.10, Jonathan Tripathy wrote:
>>>>
>>>>> Hi Everyone,
>>>>> I have set up a mail server (on a VM) as per this article:
>>>>> http://workaround.org/ispmail/lenny
>>>>> I wish to host this server for a customer. However, I don't think
>>>>> it's "best practise" to simply place the whole VM in a DMZ and port
>>>>> forward to it. My question is, what should I do and what should I
>>>>> "split up"? The networks I have available to me are:
>>>>>
>
> If using BSD or Linux, you can also enable the "local" packet filter (pf
> under BSD, netfilter/iptables under Linux) to only allow explicitely
> authorized traffic. if you are familiar with these tools, then you don't
> even need a firewall (pf and netfilter/iptables are firewalls, so you
> get a self protected box. but this is only true if "you are familiar..." ).
>
But a host based firewall which controls traffic is subject to
compromise itself. If you compromise the DMZ'd mail server, then you
could then change the firewall rules.

From: mouss on
Randy Ramsdell a �crit :
> mouss wrote:
>> Simone Caruso a �crit :
>>
>>> Il 19/07/2010 22:04, Jonathan Tripathy ha scritto:
>>>
>>>> On 19/07/10 18:07, Angelo Amoruso wrote:
>>>>
>>>>> On 16/07/2010 10.10, Jonathan Tripathy wrote:
>>>>>
>>>>>> Hi Everyone,
>>>>>> I have set up a mail server (on a VM) as per this article:
>>>>>> http://workaround.org/ispmail/lenny
>>>>>> I wish to host this server for a customer. However, I don't think
>>>>>> it's "best practise" to simply place the whole VM in a DMZ and port
>>>>>> forward to it. My question is, what should I do and what should I
>>>>>> "split up"? The networks I have available to me are:
>>>>>>
>>
>> If using BSD or Linux, you can also enable the "local" packet filter (pf
>> under BSD, netfilter/iptables under Linux) to only allow explicitely
>> authorized traffic. if you are familiar with these tools, then you don't
>> even need a firewall (pf and netfilter/iptables are firewalls, so you
>> get a self protected box. but this is only true if "you are
>> familiar..." ).
>>
> But a host based firewall which controls traffic is subject to
> compromise itself. If you compromise the DMZ'd mail server, then you
> could then change the firewall rules.

true. I was exagerating a bit, ... (but not too much!)

First  |  Prev  | 
Pages: 1 2
Prev: deferred mail
Next: Rewrite non FQDN Domains