On Tue, 2009-08-18 at 18:38 +1000, Amos Shapira wrote:
> 2009/8/18 Tony Sceats <tony.sce...@gmail.com>:
> > what you're trying to do is usually referred to as a transparent reverse
> > proxy.. you should be able to find heaps of info on this
> 
> What's "transparent" about it? It's just "reverse proxy" as far as I know.

Its not transparent at all - transparent involves handling
non-proxy-ready http requests as well as TCP hijacking :)

> And it's worth mentioning (or even iterating) - be careful not to make
> it useable to surf anything but your intended internal URL's -
> otherwise it'll get used by crackers to hide their identity on your
> expense.

Indeed, both Adrian and I provided secure configs.

I assumed the proxy was simultaneously serving outbound clients; Adrian
offered a accelerator-only config.

-Rob

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to