I should read the docs... I know...
but the quick question is why all connection appear from localhost?
With proper ip header rewriting rules that should not happen.

mic

Il 01 marzo 2012 04:49, drelyn86 <drelki...@gmail.com> ha scritto:
> It just forwards the connection like a reverse proxy, so no MITM is caused.
> Why would I need to completely disable session cookies?
>
> Anyway... I was thinking about this more, and I remembered that the current
> scaffolding app's method of preventing security breaches through generic
> views is by disabling generic views unless you are on localhost (see line 27
> of models/db.py in version 1.99.4). Since everything on SSL appears to be
> coming from localhost while using SSLH, I should disable generic patterns
> completely.
>
>
> On Monday, February 27, 2012 8:41:30 AM UTC-5, Ross Peoples wrote:
>>
>> I would be interested to see if SSH can actually be forwarded without
>> triggering a main-in-the-middle error.
>>
>> I'm not sure on the first question, but I would guess that you would want
>> to disable everything except your app.
>>
>> At the bottom of the db.py model, just put "session.forget(request)". This
>> will still create cookies, I think but will not actually use them. Not sure
>> on this one. Maybe someone else has a better answer for turning cookies off
>> completely.
>>
>> In your model, I would also disable anything you don't need: db, mail,
>> auth, etc.
>>
>> On Sunday, February 26, 2012 1:09:21 PM UTC-5, t13one wrote:
>>>
>>> I'm thinking about setting up SSLH on my personal server.
>>>
>>> From http://freecode.com/projects/sslh:
>>> ----
>>>
>>> > sslh accepts HTTPS, SSH, OpenVPN, tinc, and XMPP connections on the
>>> > same port. This makes it possible to connect to any of these servers
>>> > on port 443 (e.g., from inside a corporate firewall, which almost
>>> > never blocks port 443) while still serving HTTPS on that port.
>>>
>>> In short summary (and to my limited understanding), SSLH works by
>>> forwarding the connection from the sslh daemon to either the ssh server
>>> or the web-server (among other options). This means all SSL connections
>>> will ultimately appear to be connecting to apache/web2py via 127.0.0.1.
>>>
>>> Are there any security concerns with this? Should I disable admin and
>>> appadmin completely?
>>>
>>> How are session cookies affected?
>>>
>>> Would any other functionality be affected?
>>
>>
>> On Sunday, February 26, 2012 1:09:21 PM UTC-5, t13one wrote:
>>>
>>> I'm thinking about setting up SSLH on my personal server.
>>>
>>> From http://freecode.com/projects/sslh:
>>> ----
>>>
>>> > sslh accepts HTTPS, SSH, OpenVPN, tinc, and XMPP connections on the
>>> > same port. This makes it possible to connect to any of these servers
>>> > on port 443 (e.g., from inside a corporate firewall, which almost
>>> > never blocks port 443) while still serving HTTPS on that port.
>>>
>>> In short summary (and to my limited understanding), SSLH works by
>>> forwarding the connection from the sslh daemon to either the ssh server
>>> or the web-server (among other options). This means all SSL connections
>>> will ultimately appear to be connecting to apache/web2py via 127.0.0.1.
>>>
>>> Are there any security concerns with this? Should I disable admin and
>>> appadmin completely?
>>>
>>> How are session cookies affected?
>>>
>>> Would any other functionality be affected?

Reply via email to