quick FW question
Tim Aslat
tim at spyderweb.com.au
Tue May 11 20:41:11 PDT 2004
In the immortal words of D J Hawkey Jr <hawkeyd at visi.com>...
> Set up the mail server as the hub for your internal network, and have
> the workstations forward mail to it. If you're running sendmail on the
> workstations, put this in their .mc file:
> define(`SMART_HOST', `smtp:mailhub.privatedomain')
> And rebuild their sendmail.cf (I use the same .mc file for all U**X
> boxen on my network, except for the mail hub). Basically, just point
> all internal boxen's mailers to the hub.
I'm using Exim, and I already have this part working (smart host)
> My mail hub, in turn, defines SMART_HOST to be my ISP's mail cluster,
> and I define MASQUERADE_AS to be my ISP's domain (I use the feature
> masquerade_envelope, too). You might not be able to do this, of
> course, it'll depend on your connectivity.
Not really required for this particular setup.
> You'll need an MX record set up for the mail hub in your DNS.
Got one :)
> Given the above approach, the only thing I have in my firewall for
> SMTP is a rule for stateful outbound on ports 25 and 995 (I use SSL-
> enabled POP3 to download incoming mail from my ISP's mail cluster).
Hmmm, that doesn't really solve my problem, but it's useful to have in
the archives anyhow.
What I want to do is grab any outgoing packets bound for a port 25 and
redirect them back to the local mailserver which has spam/virus
filtering. This should eliminate problems of viruses/trojans which use
their own internal smtp servers to propogate themselves, coming from
this network.
The reason for this approach is the domain in question being RBL'd a
couple of days ago after one of the machines in this network had a
virus(actually a couple of thousand of various types).
Cheers
Tim
--
Tim Aslat <tim at spyderweb.com.au>
Spyderweb Consulting
http://www.spyderweb.com.au
Phone: +61 0401088479
More information about the freebsd-security
mailing list