Ha be critical if you want, I don't mind at all :P

The main reason was reliability, as someone who's always
breaking/rebuilding but also hosts their own email, I needed the email
to spool somewhere in case I broke something for more than a few days.

The local PF boxes are behind home NAT connections with whichever
firewall I felt like trying out at the time. More secure? I don't know
maybe/hopefully?

Having the spam check done on the cloud for the same reasons. Every time
I broke the server running the spam filter, it was like opening the
flood gates :D

For flexibility there's another element I didn't bother to mention...

The same cloud VM runs haproxy which will loadbalance IMAPS connections
back to either of the 2 local Dovecot sites. So I always have access to
my email wherever I happen to find myself.

Chris.


On 09/06/2019 23:19, Antonio Leding wrote:
> Hi Chris,
>
> Not being critical but really just want to understand why you architected it 
> the way you did…
>
> Are your local PF boxes behind a more secure border than your cloud based PF 
> server?  I understand the SPAM part of the design — or I think I do :=) — it 
> seems like you just feel more comfortable performing SPAM analysis in the 
> cloud vs. inside your border…but curious in terms of other infosec…
>
> Also, did you implement pinholes on your local side so you can access mail 
> from different locations or just opt to not have that flexibility?
>
>
>
>> On Jun 9, 2019, at 3:12 PM, cvandesa...@opendmz.com wrote:
>>
>> Maybe something like I'm doing?
>>
>> I have 3 instances of postfix running (because I travel) but this can
>> work with 2.
>> 1 server in the cloud, 2 locally one home one office.
>>
>> The 2 local postfix instances only accept public email from the cloud
>> VM, but they accept local email (ipcam's, for example on the LAN).
>>
>> The MX record points to the cloud VM, should it pass the spam test then
>> the 'clean' email is relayed to 1 of the 2 local postfix servers.
>> The local servers then deliver to a local Dovecot, where I access my
>> email from a local private IP on the LAN.
>>
>> Think of the flow like this.
>>
>> public email > Cloud VM (postscreen/rspamd test passes) > local Postfix
>>> local Dovecot.
>> Whichever local Dovecot received the message with replicate to the other
>> site.
>>
>> I think of it this way, the email is coming from the public internet, so
>> scan it while it's out on the public internet.
>>
>> If it passes the test, then it's considered 'good enough' to be
>> delivered to one of the local servers.
>>
>> Internal email like ipcam's, server emails never leave the local LAN
>> (except to be replicated to the other local site).
>>
>> Hope that makes sense.
>>
>> Chris.
>>
>>
>> On 09/06/2019 23:00, Antonio Leding wrote:
>>> AHHH - yes, thank you Paul - I did mean “cloud” based Postfix…
>>>
>>>
>>>
>>>> On Jun 9, 2019, at 2:53 PM, Pau Amma <paua...@gundo.com> wrote:
>>>>
>>>> On Sun, June 9, 2019 9:29 pm, Ronald F. Guilmette wrote:
>>>>> In message
>>>>> <0100016b3e069855-f95cf3e2-9649-4a55-8290-24a9d44f80cc-000000@email.
>>>>> amazonses.com>, Antonio Leding <t...@leding.net> wrote:
>>>>>
>>>>>> Just curious any reason to not use use the could-based Postfix
>>>>>> server + something like Dovecot and then have your clients access that
>>>>>> directly?  I have this now for at least 20 domains and it works awesome.
>>>>> Firstly, I have no idea what you mean by "could-based Postfix".  Was that
>>>>> a typo?  What did you mean, actually?
>>>> I'm guessing "could" is a typo (or perhaps autocorrection) for "cloud".
>>>>

Reply via email to