At Tuesday, May 16, 2006 10:39 AM, [EMAIL PROTECTED] wrote:

> I guess what I'm trying to do is get the most secure option with
> what I have.  I'm at the point now where I think no matter what I'm
> kinda screwed unless I get ISA or something like it implemented.

Remember that security isn't a discipline of perfection; it's about
identifying and managing your risks.

> I'm under the impression that IF someone does get pass the external
> firewall they'll be able to sniff for credentials/messages or whatever
> because the FE/BE communicate via clear text.  So if I secure the
> communication between FE/BE via IPSEC then IF the front end server
> is compromised then we're screwed once again.

How likely is it that someone gets past your firewall?

In order to accurately assess that option, you need to figure out what
the most likely avenues of attack are.

Most likely: services you have exposed or published through the
firewall. These most likely live in your DMZ. Your FE server is one of
them. Looks like you need to make sure those services are properly
configured and the hosts are hardened.

Yes, the FE and BE communicate in the clear. What will it take for
someone to listen to that communication channel? What hosts could they
do it from? Easiest would be the FE server itself -- which is why the IP
tunnel option, even if it's technically feasible, isn't going to protect
you against the real risk. Any process on that server will make use of
the tunnel.

I submit that if you have someone behind your firewall, you've probably
got bigger problems than them sniffing your FE->BE communications. Maybe
it's time to document that risk, note the chain of events that have to
happen in order for it to be a risk, and document the cost involved in
fixing that risk -- then bounce it up the chain of command for them to
decide if they think it's enough of a risk to justify the cost of
installing ISA.

> So what's the better of my options?  Someone suggested using
> m0n0wall or another linux/bsd alternative for ISA.

Not an alternative in the application proxy sense, but as an alternative
to your current NAT firewall. The key to resolving your troubles here is
telling your current NAT firewall/router to *NOT* perform NAT
translation between your interior network and your DMZ network, but just
to route the packets back and forth. If you can do that, then you can
use strict IPsec communications between your FE and the rest of your
Exchange servers.

-- 
Devin L. Ganger                    Email: [EMAIL PROTECTED]
3Sharp LLC                         Phone: 425.882.1032 x 109
15311 NE 90th Street                Cell: 425.239.2575
Redmond, WA  98052                   Fax: 425.702.8455
(e)Mail Insecurity: http://blogs.3sharp.com/blog/deving/

---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to