A Cold Fusion Programmers Guide to Secure Networking - PowerPoint PPT Presentation

About This Presentation
Title:

A Cold Fusion Programmers Guide to Secure Networking

Description:

Reality Check. Insiders need to have access to corporate resources on the road. ... to block email from known places. ... Corporate email server never relays ... – PowerPoint PPT presentation

Number of Views:65
Avg rating:3.0/5.0
Slides: 18
Provided by: edgewatert
Category:

less

Transcript and Presenter's Notes

Title: A Cold Fusion Programmers Guide to Secure Networking


1
A Cold Fusion Programmers Guide to Secure
Networking
By Jeremy Brodie, Sr. Developer
12500 Fair Lakes Circle, Suite 150Farifax,
VA703.815.2500 www.edgewater.com
2
Overview
  • Server Environment Best Practices
  • NAT/Firewalls
  • IP Environment
  • Email/Spam/Black Hole Lists

3
Why Bother (Care)?
  • Networking provides the communication allowing
    your applications to be accessible
  • Do it wrong and you place your company and your
    applications at risk
  • Possible Legal Risks?
  • Documented legal cases of organizations sued for
    poor security
  • Can affect your organizations/departments
    reputation
  • Can affect any/all Internet projects

4
Typical Environment
  • Three-tired environment
  • Production
  • Staging
  • Development
  • Source Control (Development)
  • Email Relay Server for CF Mail
  • Several Servers Networked Together

5
Typical Environment
Typical Environment Diagram
Router
Firewall
Internet
DMZ
Internal
Email Server
Database Server
Network Server
JRUN Serverw/ Cold Fusion
Development Env.
DNS Server
6
Network Environment
Your Corporate Network Will Have Many of These
Components
  • Your network may include the following items as
    well
  • One or more switches to facilitate communication
    within the DMZ or Internal Zones
  • Network Address Translation within the Firewall
  • Port blocking within the Firewall
  • Load Balancers (for high traffic sites)
  • Storage Area Network
  • Internal DNS
  • Often several employees/ departments will control
    the functioning of these network areas. Each will
    have their own areas of expertise. As a
    developer, you need to balance their technical
    concerns with the business requirements of your
    application.

Diagram Overview
Challenge
7
Diagram Technical Overview
Networking Definitions
  • Internal
  • Workstations
  • File and Print Servers
  • Outbound communication with outside. Can pull
    information from DMZ computers
  • DMZ or Production
  • Location of Servers (web, database, mail)
  • Hosted
  • Location of some production application.
    Communication with network available through FTP
    and programs such as Terminal Services

8
Network Address Translation
Definitions
Business Challenge Provide communication to
servers via a non-routable IP address Internal
and DMZ networks are on separate subnets
  • Use Non-Routeable Addresses to communicate behind
    the firewall
  • Example 192.168.10.3 for a DMZ Server
  • Example 192.168.100.3 for a Workstation on the
    Internal network
  • Addresses Reserved for Internet networking
  • Prevent Outsiders from Knowing the True Address
    of Servers.
  • Servers will have non-routable addresses only.
  • NAT Table provides reference
  • Only Exposes to Outside servers needing Exposing

9
Routing Table Example
192.168.100.2 64.23.122.2 192.168.100.3 64.32.12
2.3 192.168.100.4 65.32.122.4 192.168.100.5 65.3
2.122.5
10
NAT In Practice
  • Packet arrives with IP address
  • Firewall asks for location of DNS to translate
    name
  • Firewall translates IP address acceptable list
    located in DMZ
  • Server IP address contain Non-Routable IP address
    only
  • Internal users access NAT through Internal DNS
    server containing non-routable IP information.

Business Challenge Prevent outsiders from
reaching internal network resources. Reality
Check Insiders need to have access to corporate
resources on the road. A VPN solution allows
specified laptops to have access to Internal
resources.
11
NAT Other Tools
Things to Know
  • All internal machines communicate via
    Non-routable IP address configured by DHCP
  • DHCP uses Internal DNS to locate router
  • Internal DNS acts as a gateway between the
    Internal and DNZ networks

Business Challenge With a limited pool of
Internal addresses, allow employees to access
resources on the Internet. Set up DHCP, or a
dynamic pool of internal address with right to
access resources outside the Firewall.
Resources
  • RFC 1631 (http//www.faqs.org/rfcs/rfc1631.html)
  • NAT Overview (http//computer.howstuffworks.com/na
    t1.htm)

12
Email Spam Risks and Challanges
The Challenge
  • CFMAIL Requires a Relay Server
  • Spam is a huge problem on the open Internet
  • 30-50 of all traffic is spam
  • Spammers use unethical methods to send email
  • Spam/Virus link?
  • Legal Liability?
  • Black hole list can prevent your email from being
    routed to the right place

Business Challenge You need to send email to
external customers using your application. You
dont want to spam, however. Technology NAT can
be used to specify who relays and who does not
13
Successful CFMAIL
Goals of System
Goal 1 Prevent Outsiders from using Email
Server. If not blocked then black hole list could
shut down entire subnet Goal 2 Only allow Cold
Fusion Server to send out Email Goal 3 Use an
Opt in Mail list collected from your site to
send public email
Business Challenge Provide the ability to use
CFMAIL for external applications, while
preventing spammers from having access to Mail
servers. FactoidThe new versions of Outlook do
not by default allow customer to see HTML email.
Spammers were using external pictures to validate
email addresses.
Resources
14
The Black Hole List
What is a Black Hole List
  • Email ends up in a black hole It gets sent out,
    but customers never receive email
  • Used by spam filters to reduce the flow of spam
    to inboxes
  • Administrator subscribed

Reasons Why Black hole lists allow
administrators to block email from known places.
Employees could be liable if they did not
filter. FactoidAlthough the MAPS RBL allows
users to be removed, some systems do not have a
way to be removed from a list. If you receive a
new IP block, check to see if it has been listed.
Resources
  • Realtime Black Hole List (http//www.mailabuse.org
    )
  • Spamcop (http//www.spamcop.net)

15
Example in IIS
Router
Firewall
Internet
Business Solution Only internal servers can
relay. Since mail server accepts only Internal
addresses, one must be located in the DMZ to
relay. Separate server allows corporate email
server never to relay
IIS Web/ Mail Server192.168.10.6Only allows
192.168.10.5 and other DMZ servers to relay
JRUN Serverw/ Cold Fusion 192.168.10.5
SQL Server 192.168.10.7
16
Solution for Sending CFMAIL
Create a Win-Win Situation
Results Successfully deliver CFMAIL to your
customers. Opt-In ListsOne way of ensuring
successful mail is through the use of Opt-in
Maillists. In this case, you specifically ask for
the permission of the person before sending out
email from an application. New regulations
require companies to only send out email for
public applications using this method.
  • Use a separate server for relaying mail from
    applications
  • Relay server only accepts internal IP addresses
    from DMZ siubnet
  • Emails are logged by Cold Fusion
  • Corporate email server never relays
  • Configure corporate server to allow HTML email
    only from Internal Applications
  • External Emails Should be Reviewed With Privacy
    Policy in Mind
  • Should be Opt-in list only
  • Should be text only for external customers

17
Other Points
  • Communication is the number one reasons why
    projects fail
  • The stakes are often higher for the System admins
    that your project
  • IT pros are naturally conservative outside their
    boundaries. IT is the one saying no
  • Your organization requires better communication
    or an improved process
  • The implementation boundary is stretched
  • What are your experiences?
Write a Comment
User Comments (0)
About PowerShow.com