Search squid archive

Re: RV: squid

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 16/06/17 23:57, javier perez wrote:
They could open just a range of 5 dinamic ports and monitor them
intensively...

I take it by "they" you mean the passive attacker? the server may open any of (2^N) * (2^15) ports, where N is the number of IPs assigned to the server both IPv4 and IPv6. A range of 5 has very miniscule probability of success.

My point was that "for security" is bogus. In the end neither mode is actually "secure" because the CTRL channel leaks like a seive.

The reasons for choosing one over the other are solely about whether your network design and that of all networks your clients traffic goes through allow that mode to work properly. NAT and similar things existing all over the place nowdays invariably means passive mode is the only way to get working FTP connections, so even lazyness is self-inflicted pain.



Hello Matus,

You are right, the thing is that our clients are not going to open any
other port than 20 and 21 for security meassures (or lazyness).
FYI: The "for security" argument is bogus because;

a)  allowing any random client to determine their own arbitrary port
number(s) is strictly worse for security than having your control point
(Squid) select the port, and

b) limiting that client-selected port to 20/21 makes the data between client
and Squid go over a port which is more easily predicted and therefore
interceptable by passive attack.

Amos

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux