LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-21-2010, 12:14 AM   #1
samanp
LQ Newbie
 
Registered: Dec 2005
Posts: 22

Rep: Reputation: 0
apache in DMZ and oracle in local LAN - how to communicate?


Hi,

I will be setting up Apache web server in DMZ and Oracle web server (Windows) in LAN. The requirement is to allow logged in visitors to view / change their details via the web site.

What is the best way to configure this. Is simply allowing web server's ip to communicate with oracle server's ip (and the oracle port) is secure enough or is there a way to do this more securely?

Thanks
 
Old 05-21-2010, 08:42 AM   #2
scheidel21
Senior Member
 
Registered: Feb 2003
Location: CT
Distribution: Debian 6+, CentOS 5+
Posts: 1,323

Rep: Reputation: 100Reputation: 100
Yea the best way to do it it is write your application PHP, Java, whatever your applications is based on and only allow the IP of the apache server to talk to oracle by Oracles port., Since the DMZ and LAN are presumably Internal to your company I would't bother with anything else as long as you have a good firewall. If however, the DMZ is outside your network and or not behind a firewall I would suggest maybe an encrypted tunnel too.
 
Old 05-21-2010, 10:18 AM   #3
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 25,809

Rep: Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747Reputation: 7747
I would go a step further, and not only restrict the IP address through the DMZ, but the allow ports, too. Since this is going to be outward-facing, I'd run the Oracle listener on a non-standard port, then allow that port:IP address through your internal firewall, to talk to the box in the DMZ. If you open up the entire address, then you give a potential attacker much more to work with.
 
Old 05-21-2010, 11:39 AM   #4
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
Quote:
Originally Posted by scheidel21
If however, the DMZ is outside your network and or not behind a firewall I would suggest maybe an encrypted tunnel too.
Actually you could use SSH tunneling to forward the appropriate port from the Oracle machine to the DMZ. That way the Oracle server only has to allow SSH and the DMZ programs could communicate with localhost.
 
Old 05-21-2010, 11:58 AM   #5
scheidel21
Senior Member
 
Registered: Feb 2003
Location: CT
Distribution: Debian 6+, CentOS 5+
Posts: 1,323

Rep: Reputation: 100Reputation: 100
Got me on that one Hangdog, you are right only allowing SSH might even more secure, but is it really needed if he controls the DMZ and LAN network?
 
Old 05-21-2010, 12:07 PM   #6
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
I guess it depends on your level of paranoia. Personally I view the DMZ to be pretty much the same thing as having it out in the wild on a completely separate network.

Of course the real problem here is that no matter how you secure the communication between the DMZ and Oracle machines, it still exists and is technically exploitable. With any of these solutions, if the DMZ machine gets cracked, the bad guys will likely be able to see the Oracle machine. So a big part of keeping this secure is making sure that the DMZ machine is seriously hardened.
 
Old 05-21-2010, 02:07 PM   #7
scheidel21
Senior Member
 
Registered: Feb 2003
Location: CT
Distribution: Debian 6+, CentOS 5+
Posts: 1,323

Rep: Reputation: 100Reputation: 100
Well that's what all of technology is about, you have to sacrifice some security for usability.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How to access DMZ from LAN? GerianneMcC Linux - Security 3 12-04-2008 04:23 PM
Newbie Q: How do XP and Linux boxes communicate on home LAN? ppmoore Linux - Networking 9 09-27-2006 10:04 AM
Apache won't accept or reject incoming internet connections but accepts on local lan zenchess Linux - Networking 3 06-10-2006 09:06 AM
My LAN can't "see" my DMZ server to chk my Apache website piratebiter Linux - Networking 3 05-08-2005 05:19 PM
Apache works on local machine, not LAN lanzdale Linux - Software 3 09-02-2003 09:16 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 05:52 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration