On Sun, 2008-07-13 at 23:06 -0400, Christopher Isip wrote:
>
>
> On Sat, Jul 12, 2008 at 11:44 PM, Christopher Isip <
cmisip@xxxxxxxxx>
> wrote:
> I am going to try to create a domU webserver. My current
> setup is dom0 running Centos 5.1 with two ethernet interfaces.
> One is pcibacked to a asterisk domU ( and hence invisible in
> dom0 )and serves as the external interface there. The
> Asterisk domU is my gateway to the internet, default route,
> dhcpd server, dns server and ip masquerade server as well.
> The second interface in dom0 is the bridged interface to which
> all the domUs are connected (including the Asterisk domU).
> Everything seems to be working fine. I have a simple two
> interface shorewall configuration in the Asterisk domU.
>
> My plan is to create a webserver domU and have shorewall run
> in it as well. The domU will have default drop policies for
> all incoming and outgoing connections. There will be a rule
> to allow incoming ssh and outgoing ssh. There will be a rule
> for allowing incoming http as well. The webserver domU will
> only have one interface, and that is the bridged interface
> from domO.
>
> In the Asterisk domU, I can write a DNAT rule to port forward
> http connections from the internet to the webserver domU.
>
> It seems that this should work If xen domUs really behave as
> if they are independent LAN hosts which so far they have in my
> setup. My only question is how secure is this?. Incoming
> connections from the internet for http port will be forwarded
> to a bridged interface. Or maybe this is where things will
> break.
>
> Anybody care to comment?
>
> Thanks
> Chris
>
> I just realized that iptables on a dmz is useless. If an attacker
> gains access, the iptables rules could be rewritten and the dmz could
> be used to access the network. Rather the other hosts need to have
> default rejectd policies for the DMZ host. But I would rather not
> implement a firewall for each of the other hosts. My thinking is that
> perhaps I should not give the DMZ host a vif interface that is bridged
> to a physical ethernet device. If its possible to create a bridge
> interface without any physical ethernet cards attached to it, I could
> then present vif1 to the Asterisk domU and vif2 to the DMZ and have
> the Asterisk domU be the gateway to the rest of the lan and domUs. I
> would simply convert to a three interface shorewall configuration in
> the Asterisk domU with one interface net, the other local and the
> third DMZ.
>
> Chris