Simon Murcott wrote:

>On Thu, 2002-03-07 at 11:06, Josh Frick wrote:
>
>    Thank you.  That's what I had suspected.  NAT is NAT,  right?  I'm 
>    trying to build a multi-layered approach.  Currenlty it's two Coyote 
>    (IPchains)  Firewalls in front of Squid/Socks.  This does prevent direct 
>    connections to my clients,  which I had assumed was more secure than 
>    otherwise,  but I wasn't sure if that was meaningful.  My clients and 
>    the Squid/Socks box are not reachable by the gateway.  Only the choke,  
>    which will be reconfigured (by way of a crossover-cable)  to be 
>    connected only to the Squid/Socks box.  I just wanted to know if this 
>    was any better than simply adding a third IPchains box.
>
>Something to be aware of is that having two firewalls of the same
>flavour will not buy you any more security. If a crack/exploit works on
>one then it will work on the other. Try replacing one of them with
>another OS and firewall solution.
>
Eventually,  I plan on replacing both Coyote boxes with IPtables-capable 
firewalls.  (For statefull inspection).  The choke will be Woody,  I 
think,  with SNORT,  and the gateway will either be floppyfw or Devil 
Linux or a homebrew busybox.  But they're still going to be i386 Linux.  
Hopefully,  I can disable module support in both.

>
>Adding a third ipchains box will give you as much protection as adding a
>piece of wire.
>
This is unclear.  In the context of your first statement,  I guess 
you're saying it's just as easy to break into?

>
>Where a proxy is extremely useful is being able to inspect (and correct
>or reject) the data it receives before it gives it to the client
>machine. That is you can plug a virus scanner into squid, remove active
>x, etc.
>
How does it do so?  By default?  Or do I need to fine-tune squid.conf 
and danted.conf,  or recompile both?
   Thanks.

   Sincerely,

   Josh Frick




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to