Hi Jeff,

I hope I've understood your question correctly - and if so,
here's a serious problem. Of course you won't *directly* bind
anything to that interface; but what about *other* things that
run on that box that are intended to be on the internal
interface? Many daemons have a default configuration that just
binds to 0, e.g. binds to *every* IP address on the machine.

So you could *easily* end up with something listening on that
DMZ interface without realizing it; especially if multiple
folks have access to the box.

I'd vote for putting a separate box on the DMZ.

If I've misinterpreted your question, just ignore the above :-)

Carol


"Burgess, Jeff" wrote:
> 
>  Hey,
>    I have a question regarding running a NIC card in promiscuous mode
> without any protocols bound to it.
> 
>    Scenario is, we want to place a "monitoring" machine on our internal
> network to watch things, the idea arose to put a second NIC in the box to
> put in our DMZ (*Sort of like dual homing the machine, but without any
> protocols bound to it*).
> 
>    Now, being the security "cop" this rose several red flags for me while my
> mind was screaming out "no way in hell!" but I couldn't come up with one
> solid reason as to why not, so they want to go ahead with it.
> 
>    What I'm looking for from some of you more knowledgeable gurus is a
> reason not to let this happen, or reassurances from you as to why this isn't
> a problem, as my synapses are all screaming at me like spider man!!!
-- 
Carol Deihl - principal, Shrier and Deihl - mailto:[EMAIL PROTECTED]
Remote Unix Network Admin, Security, Internet Software Development
  Tinker Internet Services - Superior FreeBSD-based Web Hosting
                     http://www.tinker.com/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to