Compare cert salaries and plan your next career move
dustinmurphy wrote: » The best you can do is just try. Although to ME, it was too big of a pain to deal with hosting my own server... it was fun figuring out how to set it up. I just wanted to warn you that it's possible that you will not be able to hit it from the outside. After I learned how to admin Exchange, I wanted to setup my own mail server... but alas... it was blocked. It's also possible that they have removed the blocks by now. I haven't tried in a few years. As I said before... use a machine that you can handle being compromised. Do what you can to isolate it from the rest of your network (with most home networking, it's virtually impossible...)... that way if it IS compromised... you don't lose personal information.
dustinmurphy wrote: » Most residential ISP's block port 80 and 25 (web/smtp). They can and do block the ports so that you cannot access them from the outside. You also probably have a DHCP address, which means your IP will change, without notice. Using a service like DynDNS, as suggested will work, however sometimes your IP doesn't change for a couple of months. If DynDNS doesn't receive any changes within 30 days, it will suspend your account. (been there, done that). If you're doing it for "free" hosting of a website that will be used by many people... I would NOT recommend it (GoDaddy has hosting for REALLY cheap). If you're doing it for the experience of doing it... be my guest. You can use a different port (i.e. 81), but will have to remember that when accessing it. As for the attacks from the outside (scans attempting to login), that's normal. As long as you use a good strong password and good security measures, you should be OK. With that said, do not use a computer that has personal information on it. If you do get compromised... it could mean identity theft. Only open needed ports to the box... I used to try to host my own email and web, but it became too much of a pain... and I ditched it. For basic web, I wouldn't say you need much... but it depends on the site you're hosting... and how much content, what it's written in, and how many hits you get as to what the hardware requirements are.
DevilWAH wrote: » Also it is not "virtualy impossible" to make a home network secure, most home routers come with the ability to create a DMZ zone and even if they don't it is quite easy to separate of you server from the rest of your home network. Security of a home network or small office, is much simper than enterprise networks.
dustinmurphy wrote: » I said it was virtually impossible to isolate it from the rest of the network (i.e. a DMZ VLAN or a separate VLAN). Home network DMZ doesn't do the same thing that Business network DMZ does... Home networking DMZ opens all ports to the internet to a single (or multiple, if your router supports this... mine doesn't) IP address on your network, and does not isolate it from the rest of the network (i.e. if they compromise your box, they can reach the rest of the network as well), unlike a Pix or ASA which isolates DMZ and puts it in a different security zone, using ACL's to allow access back to the internal network. If you're comfortable putting your machine open to the world... be my guest.... I'd rather forward needed ports. There are a few home networking firewalls that run similar to a PIX or ASA, but all the ones I have had in my house (sub $100)... the DMZ is just opening all ports to the entire world (I usually put my Xbox360 in the DMZ... since it can't really be hacked).
DevilWAH wrote: » Having worked on security for Global Finance Banks who poor hundreds of million of dollars in to there networks each year and quite comfortably around the ASA devices. I can assure you it is much easier to split your home network securely than a enterprise network. people are also crazily over the top when they talk about how you will get hacked by opening up a port on your fire wall. If you can't split the network then just insure all your other devices are set to block incoming connections from the web-server or email server you are running. Its not hard to figure out how to do, and will give you the same security as running it on a separate vlan. The best security solutions are the simple ones, the more complex you make it the more holes you introduce. If some one takes a little time to learn about network security there is no reason even with a basic home router that you can't safely host applications, with out fear of hackers. Basic security will prevent any "Script Kiddie" attackers, and any real hackers out there hav better things to do than spend weeks finding rare and unknow exploits on a insignifint network among the billions around.
dustinmurphy wrote: » I will have to disagree with you on the above points. Most home network routers (the sub-$100 one's anyways) do not allow any "splitting" of the network. They use a single VLAN and are not capable of splitting off traffic. Sure, it's possible with the right amount of equipment, but MOST home networks do not have that capability.
Forsaken_GA wrote: » I had a boss who was absolutely brilliant, and responsible for the servers on a high speed, high availability network. When it came to patching for vulnerabilities, he was militant about getting the windows servers patched, but could care less if a linux server had been up for 5 years without being patched... he trusted the linux box a whole lot more. Moral of the story - If the internal network is going to get hacked, it's more likely to be from the user getting their personal computer compromised and that being used as the entry point into the network (hello RSA hack!) than it is that the box running some flavor of linux or BSD is going to get compromised for opening up it's web port. However security folk just love to beat the 'DONT OPEN ANY PORTS WITHOUT REALLY REALLY GOOD JUSTIFICATION' drum. The cynic in me says it's because they have to do something to try and make themselves seem relevant. The optimist in me figures that maybe they really are that paranoid. I worry a crap load more about services being installed with default credentials than I ever do about services being open that maybe shouldn't be.Let me ask you a question, are you one of those folk who think it's a good idea to filter all ICMP?
Forsaken_GA wrote: » However security folk just love to beat the 'DONT OPEN ANY PORTS WITHOUT REALLY REALLY GOOD JUSTIFICATION' drum. The cynic in me says it's because they have to do something to try and make themselves seem relevant. The optimist in me figures that maybe they really are that paranoid. I worry a crap load more about services being installed with default credentials than I ever do about services being open that maybe shouldn't be.
dustinmurphy wrote: » I will have to disagree with you on the above points. Most home network routers (the sub-$100 one's anyways) do not allow any "splitting" of the network. They use a single VLAN and are not capable of splitting off traffic. Sure, it's possible with the right amount of equipment, but MOST home networks do not have that capability. I've said to keep it isolated so that there isn't a possibility of a hacker gaining access to the box and having access to the entire network (most home networks are completely open once you get INSIDE the network). Sure, you can setup personal firewall rules on each box to not allow connections from the web server, however that's quite a bit of extra work.... since it's all on the same VLAN, you can't use the router/firewall to make these changes... as you said.. it's highly unlikely that someone running a web/email server from home will even be compromised, however with identity theft at an all-time high... I wouldn't chance it, myself.
dustinmurphy wrote: » P.S. - my Office Linux FTP server's logs were riddled with failed login attempts... just about every day.... never had a break in security, but it's always possible. Thankfully I took precautions to not allow access to the important data on the box... so I wasn't too worried.
Edit: Oh, and my wife's old website was hosted on a Linux box... at GoDaddy... somehow it got compromised... and malware was injected into the site... I'm not sure what ports GoDaddy opens up, but I'm guessing FTP, HTTP and HTTPS.
DevilWAH wrote: » Opening a port just means you have to keep control of that traffic, and the point of security moved inside the network, and may poential require more configuration on multiply devices to mitigate. I am in complete agreement though, a windows box with the fire wall turned on left open to the internet is actualy very hard to attack, despite what people think, most attacks rely on malware or some input fro the user to allow a system to be compromised.
dustinmurphy wrote: » As for my wife's website... yes, it was a PHP site... I set it up before I *REALLY* knew how to admin... and thinking back, I'm not sure how it happened, but I'm guessing it had to do with PHP.
dustinmurphy wrote: » I'd rather just use the hardware firewall, and smart internet browsing to keep my network secure.
DevilWAH wrote: » In my house there are three people using the internet including my self. as is the case in most houses. Would you suggest that you would rely only on your hardware firewall and disable fire walls on the computers. So if any one PC gets compromised the whole network is at risk? That gives you one line of defence to your network. A complete no no on any security course. "strong as your weakest link". I have seen the effects on a large corporate network of doing exactly this, Spending tens of thousands on edge security, but forgetting about the internal security. Dispute warnings they needed to think about it and there statements of "we are careful so its very unlike we get infected". A single PC being infected by malware brought the entire network to a halt in minutes. And took about 2 weeks to finally clean up.
Out of intrests if any one wants to create a true DMZ in the home network but does not want to spend $100's. then you can achieve it with two cheap/ish home routers daisy chained together. (second needs to be a cable router/firewall that accepts an Ethernet connection as its external interface. you primary router connects to your server/DMZ devices, and also to your second routers, which your internal devices sit behind. which gives you a fully configible fire wall both between the internet and you DMZ zone, and between the DMZ zone and the internal devices. Considering you can pick up a second router that will do the job for $30 or less, if you really want a simple but complete DMZ set up, its a way to consider rather than purchase a full fledged expensive router.
dustinmurphy wrote: » I find it somewhat difficult to manage 100+ PC's and 40+ servers individual firewall rules
DevilWAH wrote: » I have been driving for 15+years and never had a crash. But that dosen't mean I no longer bother to wear my seatbelt.
DevilWAH wrote: » In my house there are three people using the internet including my self. as is the case in most houses. Would you suggest that you would rely only on your hardware firewall and disable fire walls on the computers.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.