Corkscrew claims to be able to handle proxy authentication, although the website says that the feature is new and possibly imperfect.
--- marcos rocha <[EMAIL PROTECTED]> wrote: > Hi, > > i think that if you enable proxy authentication you > can dificult this. > why ??? > because the proxy authentication must be provided > before the tunnel is established. > > Marcos > > --- Robert Tasarz <[EMAIL PROTECTED]> > escreveu: > > Hi, > > > > On Sat, May 14, 2005 at 01:54:37PM +0800, Mike > > Valvasori wrote: > > > Putty (or OpenSSH or alternatives) will also > allow > > you to redirect > > > a local port to one running on a remote host. > It > > is all too easy > > > to redirect to an FTP server running elsewhere > via > > SSH over HTTP > > > and move sensitive data. Squid handles this > > well--if you specify > > > a keepalive it is completely usable for almost > any > > type of traffic, > > > including RDP/ICA sessions where you think the > > proxy would introduce > > > some sort of latency. > > > > Hmmm - in case of ftp it seems not so easy... but > if > > you want to send > > something outside and have ssh--why to bother with > > ftp when you can use scp? > > Or be creative--put WebDAV server somewhere > outside > > for example (accessible > > by https of course) :). > > > > > I have tried to work out a reasonable way to > block > > this behaviour, but > > > all solutions seem to impact on the usability of > > the proxy server. > > > Telnetting to the remote port will normally give > > you an SSH header so > > > maybe some sort of script running regularly, > > testing connected hosts > > > with remote port 443/80 (based on netstat output > > perhaps), grepping > > > for SSH and then cutting > > (http://freshmeat.net/projects/tcpipcutter/) > > > and blocking the remote host would work? > ...until > > they change the SSH > > > connection header :) > > > > Or simply they put ssh session inside of ssl > tunnel. > > Perfectly with key > > autharization of both sides, so you even cannot > > check what protocol they are > > transmitting inside (ppp comes in mind) :). > > > > In other words - give me one month, maybe less, > and > > reasons to be desperate > > enough and I'll write tunnel for sending ip > traffic > > by http in both > > directions as valid png pictures :) (and I'm > > guessing someone must done > > something similiar till now). > > > > Sorry for not suggesting any solution, but I > simply > > don't see any good enough > > for preventing all possible kinds of such abuses. > > For me only method is policy > > for personnel setting what they can do and > > adequately restrictive consequences > > for breaking it. And... not to strict rules on > > firewall - then most of abuses > > aren't too clever and easier to detect ;). > > > > Regards, > > Robert Tasarz. > > > > > > -- > > To UNSUBSCRIBE, email to > > [EMAIL PROTECTED] > > with a subject of "unsubscribe". Trouble? Contact > > [EMAIL PROTECTED] > > > > > > > > > > > > ____________________________________________________Yahoo! > Mail, cada vez melhor: agora com 1GB de espa�o > gr�tis! http://mail.yahoo.com.br > > > -- > To UNSUBSCRIBE, email to > [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > > __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

