Re: Non-standard usage of HTTP proxy servers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Alexander Yurchenko wrote:

> I'm sorry if the following things are well-known and not interesting for
> you.
> The HTML form protocol attack method described by Jochen Topf
> <jochen@remote.org> in his post to BugTraq
> (http://www.securityfocus.com/cgi-bin/archive.pl?id=1&start=2001-10-17&end=2001-10-23&threads=0&mid=20010815092019.A938@atlantis.remote.org)
> can be used in another way. It's possible to connect to one of the
> numerous public HTTP proxy servers and send a request like:
> 
> POST http://some.host:25/ HTTP/1.0
> 
> giving the SMTP commands as a content. In that way we can send an e-mail
> anonymously and trick diffrent DNS black lists. I've attached a simple
> perl script showing this technique. We can also do the same things using
> the others ASCII based protocols.
> Some proxy servers configured to refuse attempts to connect to such ports
> as SMTP, NNTP, POP3, etc, but many of them not.
> So HTTP proxy servers can do more than just retrieving HTML pages.
> 


This has been known for a while; in fact, I added this to the FWTK FAQ 
several years ago:

	http://www.fwtk.org/fwtk/faq/faq.html#2.4.13

Other proxy server may be different, so you will want to verify this 
with your vendor.


As with any good firewall configuration, the destination host/port of 
the connection is just as important as the source....  :-)

-- 
--Keith Young
-kyoung@v-one.com


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux