Jonathan Squire wrote:
> 
> Is anybody looking at things like that eGap from Whale Communications?
> (http://www.whalecommunications.com)
> 
> The URL shuttle may be of some use in situations like this, used in
> addition to a firewall it can be used to access specific content on a non
> public server w/o providing an actually network connection from the
> internet to the protected server through the DMZ.

We've been through the URL shuttle before on this list. 
Let's not start another 50-message thread about it.

The basic problem with the URL shuttle is this:
It forwards HTTP requests.

This means that it does NOT protect against 95% of the vulnerabilities
with HTTP servers. HTTP servers, after all, tend to NEED HTTP requests
in order to function ;-)

Rob Serfozo wrote:
> [want to put web server on the inside]
> What do you all think.

I would STRONGLY recommend against placing your web server on the
internal network. Hiding it behind NAT and whatever won't help
with web servers. As I said, (at LEAST) 95% of the vulnerabilities 
are in the actual HTTP requests, which your firewall will happily
forward and address translate.

-- 
Mikael Olsson, EnterNet Sweden AB, Box 393, S-891 28 �RNSK�LDSVIK
Phone: +46 (0)660 29 92 00         Direct: +46 (0)660 29 92 05
Mobile: +46 (0)70 66 77 636        Fax: +46 (0)660 122 50
WWW: http://www.enternet.se/       E-mail: [EMAIL PROTECTED]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to