I will somewhat agree with you there as I have also experience that as well. Although, I try very hard to not advocate that kind of usage.
In certain circumstances yes, in the case of OWA, I don't think so. Then again, I'm rather uptight when it comes to things like that. ;o) D -----Original Message----- From: Chris Scharff [mailto:[EMAIL PROTECTED]] Sent: Thursday, October 18, 2001 7:23 AM To: Exchange Discussions Subject: RE: Firewall and Exchange Ports. Hmm... I don't know. I think there are instances where a box in the DMZ communicating with the internal network makes sense. I think the number of scenarios where allowing that same box to also talk to an external network makes sense is very small. > -----Original Message----- > From: Don Ely [mailto:[EMAIL PROTECTED]] > Sent: Thursday, October 18, 2001 9:16 AM > To: Exchange Discussions > Subject: RE: Firewall and Exchange Ports. > > > No security consultant I know is going to open holes in the > network from the DMZ to the Internal network. Being > proficient in both Exchange and Security, I feel sorry for > your clients if you suggest the model you propose below to them. > > I think you ought to study up on security some more... > > If you open holes from the DMZ to the internal LAN, why in > the hell do you have a DMZ. You've made the DMZ virtually > pointless. Or did your teacher or book you read say > something different. If it were a book that told you to > configure things this way, please send me the ISBN number, I > really wanna read that book. Apparently, I've been taking > the wrong approach for years now. > > I happen to know of a company who has the same model you > describe. After I showed them the security issues, they were > desiring a change for the better immediately. > > -----Original Message----- > From: Frank Knobbe [mailto:[EMAIL PROTECTED]] > Sent: Wednesday, October 17, 2001 5:47 PM > To: Exchange Discussions > Subject: RE: Firewall and Exchange Ports. > > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > -----Original Message----- > > From: Ed Crowley [mailto:[EMAIL PROTECTED]] > > Sent: Tuesday, October 16, 2001 9:55 PM > > > > Don't bother. Use a proxy server and publish OWA. Or > require SSL and > > open port 443. Or implement a VPN. I still think putting an > > Exchange front-end server in a DMZ is kind of silly. Not as silly > > with Exchange 2000 as with > > Exchange 5.5, but silly nonetheless. > > Ed, > > I don't find this silly at all. Let me try to clarify: > > Scenario A: > > You have an Internet connection coming to a firewall. Behind > the firewall in your internal network you have an Exchange > server. You also have a web server (maybe on the same box, > maybe different box). You allow HTTPS traffic through the > firewall to the web server in the LAN. > > Scenario B: > > You have an Internet connection coming to a firewall. Behind > the firewall in your internal network you have an Exchange > server. In a DMZ segment (which can be a third network card > in the firewall, or a segment between two > firewalls) you have a web server. HTTPS traffic is allowed to > the web server, and required ports (say, RPC, NetBIOS, > InfoStore, Directory) are allowed from the web server through > the firewall to the Exchange server. > > > Scenario A has following disadvantages: > If your web server gets compromised, the hacker is in your > internal network. You have no means of further restricting > access (besides shutting the server down). Intrusion > Detection is almost impossible on the SSL session (unless you > terminate SSL on a proxy and go clear text from there). So a > compromise can easily go undetected, and the intruder can > probe your network and advance access. The primary intrusion > containment is all of your internal network. > > In Scenario B you have following advantages: > If your web server gets compromised, the hacker can access > everything in the DMZ. He will have to discover the address > of the Exchange server (which can be made hard through proper > host hardening). Once he has that he can attack the Exchange > server, but using Exchange as another stepping stone to gain > access to the rest of your network can again be very hard. > All those 'hard' items will buy you time. In addition, > Intrusion Detection in the DMZ can quickly alert you if it > sees 'strange' traffic coming from the web server (say FTP > connections, port scans, etc). The primary intrusion > containment is only the DMZ. > > We can even go a step further. Using a host or network based > IDS system, you can potentially reconfigure the firewall in > an automated fashion to disallow any access from/to the web > server in the DMZ. Now even the allowed ports are closed, the > attacker has no way into your network. > > > Scenario B buys you time and has far greater potential of > protecting your internal network. > > Now, I'm primarily a security consultant, and less of an > Exchange consultant, so I may look at this differently than > the average Exchange Admin and mail list member. Reading > comments like 'placing OWA into the internal network can > secure your DMZ' and 'OWA in the DMZ opens you more up than > OWA in your internal network' just make me scream since from > a security perspective, they are completely wrong. > > If anyone wants to seriously discuss this further in a > professional manner, please email me offline as I'm not going > to enter a silly discussion with armchair security 'experts' > on the list. > > Best regards, > Frank > > > -----BEGIN PGP SIGNATURE----- > Version: PGP Personal Privacy 6.5.8 > Comment: PGP or S/MIME (X.509) encrypted email preferred. > > iQA/AwUBO84mfpytSsEygtEFEQLS6gCgh9p15rpWGqhxhV91v1t55j3Fy3kAoJyp > HALyTWGaYQB8Ihjqgx1hWG71 > =ooG7 > -----END PGP SIGNATURE----- > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > > _________________________________________________________________ > List posting FAQ: http://www.swinc.com/resource/exch_faq.htm > Archives: http://www.swynk.com/sitesearch/search.asp > To unsubscribe: mailto:[EMAIL PROTECTED] > Exchange List admin: [EMAIL PROTECTED] > _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED] _________________________________________________________________ List posting FAQ: http://www.swinc.com/resource/exch_faq.htm Archives: http://www.swynk.com/sitesearch/search.asp To unsubscribe: mailto:[EMAIL PROTECTED] Exchange List admin: [EMAIL PROTECTED]