> Shore up the application's security first, then start looking beyond it.  

Yes, I understand.  I happen to be upgrading the firewall now, but also planned
on improving host security as well.

> BIND 8 added a lot of the security stuff we've all been whining about 
> for years from version masking to per-network access control to 
> configurable logging (thank goodness- having to recompile to switch 
> logging sucked.)  That feature set should ideally be your first line of 
> defense.

Yes, I've configured a few of my other boxes with bind-8, but haven't gotten
around to this particular one yet.  I shouldn't have confused things by hinting
that my box was bind-4...

> I'll admit to being slightly confused when you say you want to use your 
> firewall to protect your external nameserver.  Are you saying the 
> nameserver is on the internal network?  That's probably a less-than-ideal 

Hmm.. Sorry for the confusion.  I meant I'm rebuilding my external firewall, and
was speaking of my DNS server in the DMZ, between my interior and exterior fw's.

> topology choice from a security perspective if so.  If it's off of a 
> third service network that's not so bad, but IMO you'd be doing just as 

Well, yes, it's actually a three-NIC box making up my DMZ, then another firewall
protecting my internal network.

> well to add the filtering rules to the DNS machine itself along with the 
> application rules.  Physical access or encrypted access are the only ways 
> I'd let administrators in to the DNS.  Core infrastructure should be 
> closely guarded.  DNS qualifies as core infrastructure.

Yes, I already have strict rules thru my internal firewall to the DMZ/DNS
server, as well as ssh-only login access.  I was also thinking that it would be
easier to maintain firewall rules on only one firewall, instead of a default
accept rule to that box, when everything else is deny...

Thanks again,
Dave

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to