On Tue, 2009-08-18 at 18:38 +1000, Amos Shapira wrote: > 2009/8/18 Tony Sceats <tony.sce...@gmail.com>: > > what you're trying to do is usually referred to as a transparent reverse > > proxy.. you should be able to find heaps of info on this > > What's "transparent" about it? It's just "reverse proxy" as far as I know.
Its not transparent at all - transparent involves handling non-proxy-ready http requests as well as TCP hijacking :) > And it's worth mentioning (or even iterating) - be careful not to make > it useable to surf anything but your intended internal URL's - > otherwise it'll get used by crackers to hide their identity on your > expense. Indeed, both Adrian and I provided secure configs. I assumed the proxy was simultaneously serving outbound clients; Adrian offered a accelerator-only config. -Rob
signature.asc
Description: This is a digitally signed message part
-- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html