Yeah - good stuff…I like it…

I checked out the haproxy site and am conjuring ways to put it to use…very 
cool...Thanks…


> On Jun 9, 2019, at 3:48 PM, cvandesa...@opendmz.com wrote:
> 
> Yeah exactly,
> 
> The local instances also don't need to listen on the standard TCP ports,
> since they are always only getting email from the cloud VM. So the
> firewalls whitelist the cloud VM's IP and the email is coming in via
> non-standard ports so I don't have a horde of botnets trying to deliver
> garbage to my local Postfix/Dovecot sites. The cloud VM gets the
> pleasure of dealing with that.
> 
> It's a little unusual but it's worked for me for a couple of years now. 
> Private DNS points "mail.opendmz.com" to a local IP, and public DNS
> points to the cloud where Haproxy is always listening and will proxy the
> IMAP connection back to one of the local sites (again, non-standard
> ports and whitelisted IP)
> 
> It's nowhere perfect but I don't know what is.
> 
> 
> On 09/06/2019 23:38, Antonio Leding wrote:
>> Just practicing the Au-rule…treat other as…  :=)
>> 
>> I would definitely agree NAT buys some security via obscurity…cheap, fairly 
>> easy, and does help to a degree.  So with the haproxy, am I understanding 
>> correctly that it will spin up (or already has running) IMAP back to your 
>> local site for when you’re say, on the Int’l Space Station, and need to get 
>> email?
>> 
>> Kinda cool...
>> 
>> 
>> 
>> 
>> 
>>> On Jun 9, 2019, at 3:31 PM, cvandesa...@opendmz.com wrote:
>>> 
>>> Ha be critical if you want, I don't mind at all :P
>>> 
>>> The main reason was reliability, as someone who's always
>>> breaking/rebuilding but also hosts their own email, I needed the email
>>> to spool somewhere in case I broke something for more than a few days.
>>> 
>>> The local PF boxes are behind home NAT connections with whichever
>>> firewall I felt like trying out at the time. More secure? I don't know
>>> maybe/hopefully?
>>> 
>>> Having the spam check done on the cloud for the same reasons. Every time
>>> I broke the server running the spam filter, it was like opening the
>>> flood gates :D
>>> 
>>> For flexibility there's another element I didn't bother to mention...
>>> 
>>> The same cloud VM runs haproxy which will loadbalance IMAPS connections
>>> back to either of the 2 local Dovecot sites. So I always have access to
>>> my email wherever I happen to find myself.
>>> 
>>> Chris.
>>> 
>>> 
>>> On 09/06/2019 23:19, Antonio Leding wrote:
>>>> Hi Chris,
>>>> 
>>>> Not being critical but really just want to understand why you architected 
>>>> it the way you did…
>>>> 
>>>> Are your local PF boxes behind a more secure border than your cloud based 
>>>> PF server?  I understand the SPAM part of the design — or I think I do :=) 
>>>> — it seems like you just feel more comfortable performing SPAM analysis in 
>>>> the cloud vs. inside your border…but curious in terms of other infosec…
>>>> 
>>>> Also, did you implement pinholes on your local side so you can access mail 
>>>> from different locations or just opt to not have that flexibility?
>>>> 
>>>> 
>>>> 
>>>>> On Jun 9, 2019, at 3:12 PM, cvandesa...@opendmz.com wrote:
>>>>> 
>>>>> Maybe something like I'm doing?
>>>>> 
>>>>> I have 3 instances of postfix running (because I travel) but this can
>>>>> work with 2.
>>>>> 1 server in the cloud, 2 locally one home one office.
>>>>> 
>>>>> The 2 local postfix instances only accept public email from the cloud
>>>>> VM, but they accept local email (ipcam's, for example on the LAN).
>>>>> 
>>>>> The MX record points to the cloud VM, should it pass the spam test then
>>>>> the 'clean' email is relayed to 1 of the 2 local postfix servers.
>>>>> The local servers then deliver to a local Dovecot, where I access my
>>>>> email from a local private IP on the LAN.
>>>>> 
>>>>> Think of the flow like this.
>>>>> 
>>>>> public email > Cloud VM (postscreen/rspamd test passes) > local Postfix
>>>>>> local Dovecot.
>>>>> Whichever local Dovecot received the message with replicate to the other
>>>>> site.
>>>>> 
>>>>> I think of it this way, the email is coming from the public internet, so
>>>>> scan it while it's out on the public internet.
>>>>> 
>>>>> If it passes the test, then it's considered 'good enough' to be
>>>>> delivered to one of the local servers.
>>>>> 
>>>>> Internal email like ipcam's, server emails never leave the local LAN
>>>>> (except to be replicated to the other local site).
>>>>> 
>>>>> Hope that makes sense.
>>>>> 
>>>>> Chris.
>>>>> 
>>>>> 
>>>>> On 09/06/2019 23:00, Antonio Leding wrote:
>>>>>> AHHH - yes, thank you Paul - I did mean “cloud” based Postfix…
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>> On Jun 9, 2019, at 2:53 PM, Pau Amma <paua...@gundo.com> wrote:
>>>>>>> 
>>>>>>> On Sun, June 9, 2019 9:29 pm, Ronald F. Guilmette wrote:
>>>>>>>> In message
>>>>>>>> <0100016b3e069855-f95cf3e2-9649-4a55-8290-24a9d44f80cc-000000@email.
>>>>>>>> amazonses.com>, Antonio Leding <t...@leding.net> wrote:
>>>>>>>> 
>>>>>>>>> Just curious any reason to not use use the could-based Postfix
>>>>>>>>> server + something like Dovecot and then have your clients access that
>>>>>>>>> directly?  I have this now for at least 20 domains and it works 
>>>>>>>>> awesome.
>>>>>>>> Firstly, I have no idea what you mean by "could-based Postfix".  Was 
>>>>>>>> that
>>>>>>>> a typo?  What did you mean, actually?
>>>>>>> I'm guessing "could" is a typo (or perhaps autocorrection) for "cloud".
>>>>>>> 

Reply via email to