[24369] in bugtraq

home help back first fref pref prev next nref lref last post

Re: UPDATE: [wcolburn@nmt.edu: SMTP relay through checkpoint firewall]

daemon@ATHENA.MIT.EDU (Randal L. Schwartz)
Thu Feb 21 20:20:14 2002

To: Mike Benham <moxie@thoughtcrime.org>
Cc: Steve VanDevender <stevev@hexadecimal.uoregon.edu>,
        "William D. Colburn (aka Schlake)" <wcolburn@nmt.edu>,
        <bugtraq@securityfocus.com>, Dan Lunceford <dan@nmt.edu>,
        Ryan <ryan@nmt.edu>, <support@aquilagroup.com>,
        Madeline Navarrette <mnavarre@ts.checkpoint.com>
From: merlyn@stonehenge.com (Randal L. Schwartz)
Date: 21 Feb 2002 05:50:40 -0800
In-Reply-To: <Pine.BSO.4.33.0202191447560.21860-100000@moxie.thoughtcrime.org>
Message-ID: <m1wux754gf.fsf@halfdome.holdit.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

>>>>> "Mike" == Mike Benham <moxie@thoughtcrime.org> writes:

Mike> People use the CONNECT method from inside a LAN to make SSL/HTTPS
Mike> connections through a proxy.  I think it makes sense for proxies to
Mike> support the method by default, since browsing secure pages is very
Mike> common, but it shouldn't be accessable from outside the LAN.

Out of the box, Apache-based mod_proxy servers permit CONNECT to port
443 and 563 *only*, but can add additional ports or deny even those
ports.  In my limited experience, almost *all* other firewall proxy
servers I've encountered seem to permit any-host/any-port from inside,
either through a bad default configuration, or perhaps bungling by the
admins.  Kudos to Apache for getting it right again.

-- 
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
<merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/>
Perl/Unix/security consulting, Technical writing, Comedy, etc. etc.
See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!

home help back first fref pref prev next nref lref last post