On Mon, Jun 04, 2007 at 11:34:30PM +0100, Sam Stickland wrote:
> 
> Matthew Palmer wrote:
> >I can think of one counter-example to this argument, and that's
> >SSL-protected services, where having a proxy, transparent or otherwise, in
> >your data stream just isn't going to work.  
>
> Not so. Look at: http://muffin.doit.org/docs/rfc/tunneling_ssl.html

Sorry, that was a *really* poor choice of phrase on my part (so much for my
proof-reading skills).  It certainly wasn't what I meant to say.

What I *meant* to say is that while you *can* tunnel HTTPS (or other
SSL/encryption protected) traffic through a regular proxy, it doesn't
provide any value that a firewall can't, because you can't get any
protocol-specific info out of the data stream (which is what a regular
application proxy depends on to do it's work).  Everything that I can think
of that you can do in a proxy with an HTTPS request can be done in the
firewall instead (although you may lack the infrastructure in your firewall
to do it while it's built into your proxy, such as restricting IP addresses
or request rates or whatever).  Your HTTP proxy can't restrict HTTPS traffic
based on the requested hostname, it can't cache the request, it can't log
the request URL, it can't do any sort of request/response rewriting, and so
on.  The argumentative person might observe that you can require
authentication to use an HTTP proxy, but you can also have logins to
firewalls (a la captive portals).

Hopefully that's a little more useful (though verbose) than my previous
comment.  <grin>

- Matt

Reply via email to