On Apr 1, 2010, at 4:05 PM, Victor Duchovni wrote:

> Were you asking about using Postfix as a proxy in front of internal SMTP
> servers, or using firewall reverse-proxy SMTP support to sit in front of
> Postfix?

I was asking about Postfix running as a daemon on the firewall computer that 
handles routing and inspecting traffic between the WAN, the DMZ, and the LAN. 
This Postfix would intercept and inspect incoming SMTP connections (and drop 
some) before passing valid ones on to the real Postfix MTA running on a 
computer in the DMZ. A 3-hole PIX running Postfix, in other words.

> The latter is definitely a very bad idea.

Why? I can see how it'd be a duplication of effort, but I don't see how it 
would hurt.

> The former is sometimes
> appropriate, but fairly unusual, letting Postfix operate normally with
> a store and forward queue is much more typical and usually the right choice.

I know it's much more typical; I'd never heard of putting proxies on the 
firewall before (I'd never thought of the PIX stuff as a proxy, just a little 
content filtering (that was always getting me in trouble)). But popularity in 
itself doesn't make it the best way to do things. 

The argument is that a packet filter is easily made 'default deny' but a lot of 
cruft gets through because the packet headers may be OK, while the content is 
evil. An IDS/IPS is not effective because it's 'default allow' and is always 
chasing the latest exploit pattern. A reverse proxy, though, is an application 
level 'default deny'. Therefore, reverse proxy filtering can block 
content-based attacks that haven't been seen yet.

(I know there's a lot more to Snort's rules than just the latest patterns, and 
that it's 'default allow' because that's the way the default ruleset is 
configured. I'm just repeating some of what they said, and I'm attracted to 
parts of the proxy argument.)

-- 
Glenn English
g...@slsware.com



Reply via email to