[Mailman-Developers] MailMan-Traffic
J C Lawrence
claw@kanga.nu
Thu, 25 Apr 2002 15:27:45 -0700
On 25 Apr 2002 13:23:16 -0400
Tanner Lovelace <lovelace@wayfarer.org> wrote:
> On Thu, 2002-04-25 at 10:33, Chuq Von Rospach wrote:
>> On 4/25/02 3:11 AM, "Carson Gaspar" <carson@taltos.org> wrote:
>> But by moving the data from the list machine in the border zone
>> inside the main firewall, it also makes that data less prone to
>> attack from cracked machines elsewhere in the DMZ. If the data is on
>> the box, a cracker could potentially get it by cracking into the DMZ
>> anywhere and then cracking the database. By moving it and configuring
>> the firewalls properly, they'd have to crack ONTO the list machine
>> and then crack the data connection through the firewall.
> Don't forget, however, that since the list machine must get at the
> data somehow, you now have one more opening through your main firewall
> that must be secured/monitored/etc... So, basically, it's a trade
> off.
Not necessarily. Just put in an additional DMZ layer so that you have a
different network segment used for data servers than for public servers.
(I'm running exactly this setup with my home network: public net, public
DMZ net, private DMZ net, in-house net (desktops etc), 802.11b net --
each a physically distinct network segment).
--
J C Lawrence
---------(*) Satan, oscillate my metallic sonatas.
claw@kanga.nu He lived as a devil, eh?
http://www.kanga.nu/~claw/ Evil is a name of a foeman, as I live.