On Thu, Nov 01, 2007 at 08:32:00AM -0400, Cory Snavely wrote:
> It has an effect if your Postgres instance isn't blocked at the
> firewall, and people are actually trying to access it. Which they will,
> unless you block them. As I said, probably much safer to block at the
> firewall level--better protection from DOS as well.

My custom is to always set up a firewall on a new server and only
allow external access to the services the server is being installed to
provide externally.  Nobody outside your organization needs to talk to
your Postgres.  Probably very few hosts *inside* your organization
need to talk to it -- possibly only localhost.

A nice thing about firewalls is that you can make a port totally
vanish for the miscreants: they get nothing back, not even a TCP NAK
or ICMP REJECT, in response to their SYN packet.  Your cost to
silently absorb a packet is quite low.  You can sample the rule
counters periodically or log attempts if you are interested in
statistics.

The flip side of DROP policies is not so nice: you have to train
yourself to think "firewall?" whenever a desired network flow seems to
just disappear.  Between firewall rules, IPsec policies, libwrap,
xinetd host restrictions, listen() address scope, and application
access controls (defense in depth, you know), finding a network
connectivity problem can be bad for one's blood pressure.

-- 
Mark H. Wood, Lead System Programmer   [EMAIL PROTECTED]
Typically when a software vendor says that a product is "intuitive" he
means the exact opposite.

Attachment: pgpV9YZRsusR5.pgp
Description: PGP signature

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
DSpace-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/dspace-tech

Reply via email to