On Mon, 31 Mar 2003 10:24:15 +1000
Paul Hampson <[EMAIL PROTECTED]> wrote:

> On Sun, Mar 30, 2003 at 05:23:10PM -0500, Robert Brockway wrote:
> > On Fri, 28 Mar 2003, Hanasaki JiJi wrote:
[snip]
> > If you have more than 1 static address, an MTA running in a DMZ is
> > definately better.  This way you could still have your internal MTA
> > being port forwarded by restrict access through the firewall by
> > source address, such that only your MTA in the DMZ can access the
> > port redirect.  If you can restrict access by way of network
> > interface on the firewall[1] then you're much much better off again
> > as this protects against a spoof.
> 
> I don't quite follow this... Surely if one can break into the
> port-forwarded MTA, one can break into DMZ's MTA, which would
> then allow the attacker to access the port-forwarding anyway?

The truely paranoid run differening MTAs on the DMZ and internal
networks; hopfully there arn't two zero day exploites. Even on a single
ip (most users) you can always use UML virtual servers. Port-forward
onto a seperate subnet and do not trust other traffic on that subnet. 

Defence in depth, and all that. Or just keep on top of the latest
patches/updates and run small sites with low bandwidth...

Thomas

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to