Berend De Schouwer wrote:

>On Wed, 2002-03-06 at 16:21, Josh Frick wrote:
>
>>I've just added a Dante/Squid proxy to my network,  and I'd like to know 
>>if this is significantly more secure than packet filtering.
>>
>
>You can view the separate services as:
>
>packet filtering = IP layer filtering.
>masquerading = IP layer NAT.  (okay, a subset)
>squid proxy = application layer filtering.  (and HTTP cache, and ...)
>socks = application layer NAT.
>
>They are completely different beasts and complement each other.  One is
>not "more secure" than the other -- they offer completely different
>services.
>
Thank you.  That's what I had suspected.  NAT is NAT,  right?  I'm 
trying to build a multi-layered approach.  Currenlty it's two Coyote 
(IPchains)  Firewalls in front of Squid/Socks.  This does prevent direct 
connections to my clients,  which I had assumed was more secure than 
otherwise,  but I wasn't sure if that was meaningful.  My clients and 
the Squid/Socks box are not reachable by the gateway.  Only the choke,  
which will be reconfigured (by way of a crossover-cable)  to be 
connected only to the Squid/Socks box.  I just wanted to know if this 
was any better than simply adding a third IPchains box.

>> I can't 
>>seem to get a straight answer from online documentation for Socks,  and 
>>I know Squid is not inherently secure,  but I have a fairly 
>>straight-forward question:
>>
>>    Do Socks4/5 and/or Squid actually prevent packets with inappropriate 
>>protocols from being passed on to the client (i.e. telnet to port 80)?
>>
>
>No and yes.
>
>Socks doesn't analyze packet contents.
>
>Squid does, but telnet to port 80 is not inappropriate, and just
>establishes a TCP/IP connection.  If you want to block people connecting
>to a potential telnet _server_ on port 80, then yes, squid will block
>it.  Read the config file to learn more, as by default it allows more
>than just HTTP (like FTP).
>
I do intend to fine-tune Squid.  I just wasn't sure it could filter 
content based on protocol.

>
>
>>    If not,  what does?
>>
>
>Socks allows just about any generic protocol through, so it will be hard
>to block anything.  I know, for example, that socks allows SSH, which is
>entirely encrypted.
>
>Squid should definitely be able to block anything that is not a HTTP
>GET/POST request, which is what I assume you want to do.  But you should
>really test that, and test it for your current configuration.
>
Yes.  That's what I want.  Just HTTP/S.

>
>Be careful: there are ways to tunnel telnet over HTTP, which were
>specifically written to get around proxies.
>
So Squid and Socks do nothing to address this?  Or does the tunneled 
telnet try to connect to the Socks/Squid box?  (which does not have telnetd)

>>   Sincerely,
>>
>>   Josh Frick
>>




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to