At 12:20 02/02/01 -0400, Brian Steele wrote:
>Hmm.. Can someone give an example of how a "compromise" that opens the
>internal network to the attacker could work, if the proxy server is passing
>only HTTP traffic on port 80 between the internal server and the Internet
>client?
if a guy manages to have a root account on the webserver and if the webserv
is inside,
then the guy is able to go anywhere in your network.
just forget about "only http". If that was easy to have, we'd put our
servers directly
on the internet!
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]