The DMZ Zone
Introduction
The
De-Militarized Zone,
or
DMZ,
is an expression that comes
from the Korean War. There, it meant a strip of land
forcibly kept clear of enemy soldiers. The idea was
to accomplish this without risking your own
soldiers' lives, thus mines were scattered
throughout the DMZ
like grated Romano on a plate
of fettucine :) The term has been assimilated into
networking, without the cheese :)
Network geeks use it to mean:
"a portion of your network which, although under
your control, is outside your heaviest security."
Compared to the rest of your network, machines you
place in the DMZ
are less protected, or
flat-out unprotected, from the Internet.
Once a machine has entered the
DMZ,
it should not be brought back
inside the network again. Assuming that it has been
compromised in some way, bringing it back into the
network is a big security hazard.
Use of the
DMZ
If
you decide to build one, what do you do with it?
Machines placed in the
DMZ usually offer
services to the general public, like Web services,
domain name services (DNS), mail relaying and FTP
services (all these buzzwords will be explained
next). Proxy servers can also go in the
DMZ.
If you decide to allow your
users Web access only via a proxy server, you can
put the proxy in the firewall and set your firewall
rules to permit outgoing access only to the proxy
server.
As
long as you've attended to the following points,
your DMZ
should be ok:
If
you put a machine in the
DMZ,
it must be for a good reason.
Sometimes, companies will set up a few workstations
with full Internet access within the
DMZ.
Employees can use these
machines for games and other insecure activities.
This is a good reason if the internal machines have
no Internet access, or extremely limited access. If
your policy is to let employees have moderate access
from their desktops, then creating workstations like
this sends the wrong message. Think about it: The
only reason why they would use a
DMZ
machine is if they were doing something
inappropriate for the workplace !
It should be an isolated island, not a stepping
stone. It must not be directly connected to the
internal network. Furthermore, it shouldn't contain
information that could help hackers compromise other
parts of the network. This includes user names,
passwords, network hardware configuration
information etc.
It must not contain anything
you can't bear to lose. Any important files placed
on the DMZ
should be read-only copies of originals located
within the network. Files created in the
DMZ
should not be able to migrate
into the network unless an administrator has
examined them. If you're running a news server and
would like to archive news, make sure the
DMZ
has its own archival system.
What sort of things shouldn't
you do? Example: If you're running an FTP server in
the DMZ,
don't let users put
confidential information on there so they can get it
from home later.
It must be as secure a host as
you can make it. Just because you're assuming it's
secure doesn't guarantee that it is. Don't make it
any easier for a hacker than absolutely necessary. A
hacker may not be able to compromise your internal
network from your DMZ,
but they may decide to use it to compromise somebody
else's network. Give serious thought to not running
Windows on your DMZ
machines; it's inherently
insecure and many types of intrusions can't be
detected on Windows. Linux or openbsd can provide
most, if not all, the needed functionality along
with a more secure environment. |