elemint@cox.net wrote: > > What is the best way to update a web server securely in a DMZ? > > I think this could be done throught iptables/host.allow/hosts.deny to only allow a particular host to talk to that webserver. > > Does anyone have any insight on the best way to keep a webserver secure in a DMZ while still being able to easily update it? Would a staging server running apache be good as the allowed host, so on this staging server it would be tested one last time and then sent on to the live server? > > Would a recieve only cable be a good idea so the server on a seperate nic would have a cable where it could recieve only recieve the updated files and then implement them? > > Does anyone know a good place to buy or intructions on making a recieve only cable? > > > > Jim > > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > To subscribe, unsubscribe, or to change you mail settings: > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss Hi Jim, I'm cringing here. If you have to come up with interesting and novel solutions, the fundamental architecture is flawed. I would start there, fix the architecture. Difficult solutions are usually less secure as it is harder to find the flaws and the flaws are bigger. The staging server is an excellent idea and in use in almost every major company that deploys web content. One note, however - don't allow your staging server to be open to the Internet unless it is hardened and protected like a prod server. I know of several staging servers that have development passwords because most of the staff doesn't knows it's in the DMZ. My staging server is not in the DMZ. All testing is done internally. Any external agents that need to test do so via VPN. If it must be open to the Internet, try a maintenance network. A very useful method used to update DMZ content is via a maintenance network which uses a different IP range and a different NIC on the server: INTERNET---FW--+----------+--FW---OTHER LAN | | SERVER SERVER | | +----------+--FW---MAINT LAN Set up netfilter/netacls to limit traffic, drop stupid traffic, keep the traffic separated, no forwarding, etc. Configure SSH to listen on the maintenance network only. Updates will be a piece of cake though the maintenance network. Cheers, George Toft Computer Security AGD,llc www.agdllc.com 623-203-1760