Bill
<>
• Thank you for the clarification on the DNS setup, I will do those things later when all the echoes associated with this particular project have died down:~/
<< Don't think of it as LAN and email and etc. accounts. Each user has an SME account. This account includes LAN, email, etc. They're all part of one account.>>
• Got it:~) Have already implemented something like your Machine Account trick to keep the Samba stuff happy.
<>
• Your point is taken - in spades.
<< You cannot access the SMTP server from outside the LAN. There's no authentication built-in, so anybody and everybody would be able to send mail from your server. This is an open relay. Do a Google search on that, and you'll find a bunch of angry people. =) The addons add an authentication layer. You have to login with a valid username and password, then you are granted access to SMTP, even from outside the LAN. They also add SSL email abilities, so that your password isn't sent over the internet in plaintext.>>
• It's this area that I haven't yet got right. Simplistically put, anything to do with this area fails (here), seemingly no matter what I try. I've put almost everything I can lay my hands on to 'Public' but I still see packet discards in the hardware firewall's logs. Similarly on the hardware firewall I've opened up all the named ports in question. Almost seems like a darned open door:~| I should be able to do all this stuff within the LAN and not via the internet...
<>
• Even with all the wonderful looking addons, I still cannot get some of those things to work, though they have all installed correctly (I believe). I think it points to with some issue or setting I have yet to identify and surmount.
• For instance Darrell May's *servermonitor* can't be persuaded to play ball. Most importantly (for me), all of Damien Curtain's *secure email* stuff doesn't yet hit the G-spot though I've gone through and installed the whole bunch.
• Whereas Night Spirit's *system monitor* and *user access shell* stuff all play ball nicely. I would have tried the *IMP* stuff but one of the necessary download files (horde) was stuck on their server with a forbidden file access flag. I've emailed but yet to have a response.
* * * * *
Last night the firewall's logs showed a 15second run of 'allowed' packets from an entity in 210.0.178.56 that used a variety of ports including the secure flavours... and I'm wondering just what the hell all that is about:-( It's not as though the damn firewall ever allows MY packets to come in, they always get the discard treatment! So I'm guessing here, but maybe I've been probed? SME mail logs show only a few test emails of mine going to and fro. My assumption is that this is not something I can ignore.
* * * * *
Project not panning out at all well.
Though I'd put my education a lot further up the learning curve.
Successes...
• domain can now have a presence on the internet
• SME webserver page(s) can be browsed to
• SME email SMTP sends - only from server itself (PINE)
• SME user account receives email - can only read it on server (PINE)
• a number of SME addons
Failures...
• any use of SMTP engine from own intranet (Forté or Mozilla)
• any use of SMTP engine from internet (not even insecurely)
• access to SME user account from own intranet (Forté or Mozilla)
• a number of SME addons - particularly the 'secure' kind
* * * * *
My trepidation over the complexities of firewalls proved to be nearly right, though I did think I ought to have been able to get it all working. I earlier though it would be a good idea to have only one firewall resident - the external firewall. However I haven't been successful in converting SME's server-only requirements into the hardware firewall's operations, I think that's only too obvious.
Think it might now be best to purchase additional NICs (to double up the single NICs) and setup both SMEs in the full server-firewall-gateway mode. This will allow SME and the myriad of addons to work natively doing what they do best. The bit about me then not being able to mess things up can be quietly murmured:~/ The hardware firewall has a DMZ setting which, I understand, sets up an open but otherwise isolated path to a designated IP subsisting in the IP range allocated to the Trusted Network. Each SME, as appropriate, can then be setup to run natively in the DMZ.
Given last night's security question mark I'll wipe the test SME's drives.
best wishes, Robert