On 05/11/05, Sanjay Arora <[EMAIL PROTECTED]> wrote:
> > Nobody would trust such advertisements - I presume you meant the EHLO
> > argument - hence you will need to actually put your outgoing SMTP
> > server on the IP address which points to calvin.mydomain.com.
> >
> I didn't exactly get this. Let me tell my setup. I have a IPcop firewall

Every mail server has two bits of information to identify a connecting client.

1. The argument the connecting client presents with the SMTP EHLO
command. While the RFCs require this to be the FQDN of the connecting
client, this can be easily spoofed by the client. No self-respecting
server will use this bit as the sole source for client identification.

2. The IP address from where the client is connecting from. This
cannot be spoofed, hence this is what most servers rely on. Mail
servers of busy ISPs require that this IP address has a valid reverse
DNS entry.

(We are talking only of the connection setup; I know there is SMTP
AUTH etc. to identify the client once the transaction is in progress).

> distro running on a machine using 3 network interfaces...one uses the
> public Ip and is connected to the ISP, second uses 192.168.x.x and has
> the web-server (also the incoming mail server..as I propose to firewall
> outgoing connections on SMTP port on this machine) and the third is the
> local network with IP range 192.168.y.x.
>
> I have a server on the internal network that again hosts a webserver for
> the intranet and I propose to use this as outgoing mail server. This is
> the only machine on the whole network whose outgoing SMTP port will not
> be firewalled. Technically, what I am trying to do is make the machine
> on the internal network to be the only outgoing email gateway of my
> network, with anti-virus & content filter etc. The outgoing connection
> of course will be natted and with reverse dns, should be acceptable.

If I read that correctly, you plan to have two websites and two mail
servers on two servers - one in your DMZ and one inside your LAN. Why
don't you put both these servers on the DMZ and merge your two
websites into one server by Apache virtual hosting, and use the other
server for emails in both directions? I'd expect it to be a cleaner
design. You will open up port 80 inbound on the webserver machine,
port 25 inbound and outbound on the mail server machine. Further, you
will use Apache's mod_access to restrict your intranet to your
internal LAN (or run your intranet on a different port and do port
translation on your firewall).

Your basic design is sound - you have clearly demarcated your Trust,
Untrust and DMZ security zones. But after that you seem to have
faltered - by putting machines that should go on the DMZ into your
Trust zone.

I am not familiar with IPCop, but any decent firewall will let you map
IP:port1 to one server in your DMZ, and IP:port2 to another.

Binand


-------------------------------------------------------
SF.Net email is sponsored by:
Tame your development challenges with Apache's Geronimo App Server. Download
it for free - -and be entered to win a 42" plasma tv or your very own
Sony(tm)PSP.  Click here to play: http://sourceforge.net/geronimo.php
_______________________________________________
linux-india-help mailing list
linux-india-help@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to