Okay, your specific point is that having a FE server in the internal
network is as good as having one in the DMZ?

Well, if the FE server in the internal network is compromised it has
open access to all of your internal network.  So, there would be be no
difference if all of the hosts and workstations within your internal
network were hardened to the security level provided by the firewall
between the DMZ and your internal network.  But, practically, I've never
found that to be a possibility.  I suppose if I personally created every
internal system I could achieve this, but I'd be swamped trying to do
this with more than a few dozen machines.  Minimally, you'd need a
software firewall on all your internal hosts and workstations (which
admittedly is where technology seems to be heading).  I suppose you
could put a router access-control list between your FE server and the
rest of your internal network, but really that would just be a way of
recreating a DMZ.  But this path will become more elaborate than
deploying the DMZ.  

What is your fear of implementing a DMZ?  It's no more complicated than
the initial firewall deployment and often can be done with the same
hardware/software used for that firewall.  

My assumption is that you have an internal network.  I suppose if there
wasn't one, then my arguments might be tenuous.  

Regarding costs, you can't really design without attention to costs
(hardware, software, technician time, user disruption/training). Yes,
you can build rather than buy to some extent (open source firewalls,
intrusion detection scripts you design yourself, etc) but that would
just push up the technician time and expertise requirements to save
hardware and software costs.  It might be entertaining to totally
disregard costs in an engineering solution, but it has almost no
practical value.  Ultimately, resource allocation is the primary
limiting factor in all engineering designs, so I can't ignore costs in
proposing any solution.      

Russell Ragar, MCSE+I, CNE, CCNA
Senior Network Engineer
PowerTV, Inc. 

-----Original Message-----
From: Chris Scharff [mailto:[EMAIL PROTECTED]] 
Sent: Friday, June 07, 2002 2:37 PM
To: Exchange Discussions
Subject: RE: lesser of the evils - ssl or smtp



-----Original Message----- 
Regarding Outlook Web Access deployments, particularly with Exchange
2000, I can see a large benefit to deploying a front end server in the
DMZ which communicates to the Internet client using SSL and the backend
mailbox servers over HTTP.  

CS: Specifically over a FE server on the internal network?

Not only is there off-loading of the
encryption processing,

CS: Apparently not over a FE server on the internal network. I too can
compare apples and pears and claim an apple is a woefully inadequate
pear.

 but it provides you a location for containing
external attacks. 

CS: How specifically are they contained when between my FE server and my
other E2K servers/AD/DNS servers there are a host of ports open,
including quite possibly the ports which you used to run your original
exploit.

 Yes, in a sense, all servers in the DMZ are
sacrificial victims.  The theory is that you keep your sacrificial
victims in a contained area so they can be monitored carefully and you
fall back and reformat them as soon as they are compromised.

CS: What are we using to monitor this box specifically and what exploit
did we use to access the box in the first place (any Exchange version
443 based
exploit) that our IDS is going to detect the behavior and alert us?

  Obviously
you need both intrusion detection and host-based firewalling with the
DMZ (to prevent compromise of the DMZ from host to host).  If there were
no front-end server (direct OWA access on the mailbox server) you
couldn't possibly monitor it as well since it is performing many more
functions.  

CS: This post began with the question of what is the advantage of a
particular server in a DMZ. Changing the equation to say 'if we add
this, that and the other, and implement a DMZ we'll be more secure than
if we just publish our password on the internet' is silly. 

Also, you certainly couldn't scrub it easily if it were compromised. 

CS: IBID

 If you were running a front-end server internally
(no-DMZ), if that box were compromised it could be used as a staging
area for an attack on all your internal systems.  

CS: And the FE server in my DMZ couldn't? Puhleese.

So, yes, the
assumption is that all machines in your DMZ will eventually be
compromised and they are suspect.  

Okay, given my recommended configuration, the essential problem is that
the front-end server has to have access to some key internal services in
order to function. The trick would appear to be to lock down those
internal services as much as possible and to get a really good intrusion
detection system that will allow you to shutdown your front-end server
access to internal services as quickly as possible.  

CS: And I couldn't harden my FE server on the internal network in the
exact same way? What would be the net increased risk if I were to do so?

Okay, there is a cost associated with providing this type of set up.

CS: Ignore cost, it's a red herring thrown up to say... if I spend more
money than you, I can design a more secure system then you. If I spend
the same amount of $ and have the same basic config except my FE server
is in my internal network specifically and demonstrably how am I less
secure?

You can't run a front-end server on Exchange 2000 Standard, you'll need
Enterprise.  You'll need a good firewall.  You'll need good virus
protection, host-based firewalls, and an intrusion detection system
(network defenses without intrusion detection is like a city wall with
no night watch).  None of this is cheap, but that's the price of using
OWA on the Internet.  If you don't have the money to do it securely,
don't provide the service. 

CS: I'm using OWA on the internet and am quite content with my current
configuration/ risks. I don't see how simply placing my OWA server in
the DMZ will make it more secure and your post, while interesting in a
'it's redundant because it's been covered ad infinitum in the archives'
kind of way is purely theoretical and demonstrates no intrinsic value
gained specifically from the placement of the Exchange server in a DMZ
in my mind.

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to