Search squid archive

Re: CVE-2009-0801

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 19.12.2015 um 00:52 schrieb Amos Jeffries:
> Why not?
> * NAT/TPROXY is mandatory to happen on the Squid machine directly since
> kernel and Squid are performing integrated operations.
> * PROXY protocol passes the ORIGINAL_DST explicitly over the wire.
> * SSL-Bump all happens "inside Squid".
>
> Those are the only forms of interception Squid supports.
>
Thanks for making that clear! I fixed my setup accordingly. Squid now
gathers original IP addresses from NAT.
I also enabled host_verify_strict, which should make sure requests are
always sent to correct IP addresses. Is there an equivalent setting for
peek-and-spliced HTTPS connections? Or does host_verify_strict cover
that case as well? This would be important, since otherwise a malicious
application could bypass the whitelist ACLs I have installed.

Nikolaus
_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux