Hi,

Good idea.

I'll soon install a centralized logs server (with rsync) for logs retention
an alalysis, maybe I will use this server to update Postfix files. It will
be in the trusted network, so, I will generate SSH Keys. The private Key
will be stored in the trusted network, and the public Key on each Postfix
server (DMZ).
All I need is to create a script that synchronize the files et then run the
Make (remote) command.

This seems to be the most suitable solution for me.

Thanks everybody,
Luis



mouss-4 wrote:
> 
> Le 26/02/2011 08:46, Luis Esteves a écrit :
>> 
>> Yes, relay_domains, sender_access, ....and more.
>> 
>> Maybe the easier solution is to use the ssh/keys, but is it not dangerous
>> to
>> store private keys on a DMZ ?
>> 
> 
> Use a trusted host in a trusted place to push the configuration to all
> your servers. This is typically done from a management zone connected
> using a management network.
> 
> so on the trusted host, you can have an ssh agent so that you don't need
> to type your pass phrase too often, but still lock the key when you
> don't need it.
> 
> as for communicating with the servers, you have many options.
> 
> - you can use sql, possibly with replication
> - you can use rsync over ssh to copy/sync files to the servers
> - if you need to run commands from time to time, use cron with a local
> script. this script could check for changes and run custom commands.
> - if you need to run specific commands "now": you can use ssh with a
> forced command to restrict the damage should the key be compromised/theft.
> - another way to restrict the list of commands is sudo
> - ... etc
> 
> 
> 
>> [snip]
> 
> 

-- 
View this message in context: 
http://old.nabble.com/Update-Postfix-transport-file-on-multiple-servers-tp31008507p31038128.html
Sent from the Postfix mailing list archive at Nabble.com.

Reply via email to