AW: Secure those serversFrom: Stefan Osterlitz (email@example.com)
- Previous message: Radoslav Dejanović: "Re: Locking Screen Savers"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: "Stefan Osterlitz" <firstname.lastname@example.org> To: <email@example.com> Subject: AW: Secure those servers Date: Fri, 10 Aug 2001 11:36:31 +0200 Message-ID: <C5FEADB4FB3EE543959CE43DEE2ABE4E35E5@trendserver.blox.blox.ag>
> I think first of that
> we need to put
> the web servers behind a firewall allowing only port 80 to
> pass (here is
> where it gets foggy for me) then another firewall with open
> ports needed for
> the web servers to talk to the other servers, which ports I
> am not sure of
> yet. Should the web servers be multi homed? Where to use
> public IP’s and
> where not to? Should a domain model be used?
Maybe you should read in on the matter first:
The NSA has published papers on securing Win2K servers:
For IIS webservers, www.eeye.com is a good resource, too.
Next, you should plan your implementation:
"Best practice" is to use a frontend/backend architecture:
the outer firewall should be configured to let through port 80 to the cache.
The cache should communicate only with the web servers, via some internal
port (say 8080).
The webservers should communicate with the backends only when necessary.
If your database is used only for the webservers, put it into the dmz, too.
Otherwise put it into the internal net.
Personally, I prefer to push files and databases from the backends to the
dmz at regular intervals via ssh/scp/sftp.
This allows me to maintain a "known good" copy of the important data on
Additionally, i can block any connection from the dmz into the internal net.
It is important to set up a good IDS (Intrusion Detection System) on the
Log any spoofed packets, any packets off port 80, packets off the cache's
Try snort as IDS (www.snort.org). The Hogwash module might be interesting
for you, too.
you can use it to filter things like "code red" attacks and malformed urls.
Question to all: does anyone know of a good (url checking) protocol checker?
I am looking for a solution to block standard "buffer overrun" requests from
It should get "too/many/slashes/in/this/path//////" attacks as well as
"256times\x" requests, and things like that.
In 90% of cases, unicode expansion is not necessary for me.