You've got the right idea. Implementing it isn't trivial though, and I 
wouldn't recommend putting all those eggs in one basket (on the same 
host), unless you use a "virtual" platform to do so.

I recommend you look into IPCop or pfSense for a firewall host. You can 
put IPCop on an old PII or PIII host. It only takes 128M of ram, and a 
1G HDD would do fine. These distros are robust network service hosts 
(router/firewall/vpn/dhcp - you name it).

BL, you really don't want your mail server (or any server for that 
matter) handling network security. Apply the KISS rule whenever possible.

-- 
-Eric 'shubes'

On 09/03/2012 01:52 PM, BC wrote:
>
>
> This is probably over my head.
>
>   From my reading about a "DMZ", that would require using a 3rd NIC on
> the host machine, right?  I have a mobo NIC that I'm not using
> presently and could assign it an address of say,  10.10.0.1 (the LAN
> is 10.0.0.1)
>
> Presently, everything that is running on the host machine is basically
> attached to the 10.0.0.1 IP address in some way or another.  For a
> short time I experimented with tinydns and ran it on the 127.0.0.1 IP
> on the host, but I don't use local dns hosting.
>
>
> So, if I'm understanding you the proper way to do this would be like so:
>
>
>                               _________ LAN (10.0.0.1) - all the
> processes needed (dhcp, resolver), various Windows machines...
>                              /
> WAN (internet)/
>                            \
>                             \__________DMZ (10.10.0.1) - email server,
> spamdyke, separate resolving cache
>
>
>
> Do I have this right?  Then I'd punch a hole through the firewall
> between 10.0.0.1 and 10.10.0.1 so I could do my email via the LAN?
>
>
>
>
>
> On 9/3/2012 11:00 AM, spamdyke-users-requ...@spamdyke.org wrote:
>> Here's the thing. Your mail server should be on the DMZ subnet (I'm not
>> sure of PF's terminology). That subnet has no access to dhcp or
>> resolvers, for security reasons. I suppose you could punch a pinhole for
>> DNS requests, but that sort of defeats the purpose. Since all hosts in
>> the DMZ should use a resolver/recursor which is not on the (trusted)
>> LAN, they can a) use their own, b) use a common one on the DMZ subnet
>> (but preferably*not*  an authoritative DNS host), or c) use one provided
>> by an ISP or other service (OpenDNS and Google provide several free
>> ones). The options are in order of efficiency, and probably preference
>> as well for most cases.




_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to