Let's use the example of the eEye vulnerability. With this attack, the
webserver on port 80 could be dumped and a hacked copy of netcat
could replace it... the proxy would still permit this traffic, (if the
proxy is set to look for specific http stuff in the stream... a
hacked copy of netcat client could pass commands wrapped in what looks
like http, and the server could strip the http, and execute the
commands) and the attacker would be sitting at an Administrator
prompt. From there he could telnet to other servers in the network, or
install a packet sniffer, or L0phtcrack, or work on the proxy server
from behind, and attempt to install a backdoor on the proxy
itself. Then he would be able to connect to the proxy directly, and
gain access to the network.
It is always best to use the idea of isolation, any system touched by
'untrusted' users or networks should be quarantined from the corporate
network.
Brian Steele writes:
> Hmm.. Can someone give an example of how a "compromise" that opens the
> internal network to the attacker could work, if the proxy server is passing
> only HTTP traffic on port 80 between the internal server and the Internet
> client?
>
>
> Brian
>
>
> ----- Original Message -----
> From: "Paul Cardon" <[EMAIL PROTECTED]>
> To: "Kelly Slavens" <[EMAIL PROTECTED]>
> Cc: <[EMAIL PROTECTED]>
> Sent: Friday, February 02, 2001 11:55 AM
> Subject: Re: Configuration Arguments... In House...
>
>
> > Kelly Slavens wrote:
> > >
> > > I have a situation where I have a Server, which will host web
> > > content from "Internal" Data to the external world. This Server Needs
> only
> > > have web services accessible to the outside world beyond our network.
> Our
> > > current configuration is a Cisco Hardware Nat/Router Packet filter
> directly
> > > connected to the Internet connection. Connected to that is our MSProx2.0
> > > (Being replaced with ISA Server soon)... One individual wishes to place
> this
> > > new web server directly behind the NAT alongside the Prox, With a so
> called
> > > "one way" push only network connection to the internal network. This
> seems
> > > like a bad idea to me. My suggestion was Place the Web server behind the
> > > prox and use Reverse prox to redirect all web traffic to only this
> single
> > > internal Web server. This to me seems to be more secure than a second
> > > machine sitting in the DMZ with a connection to the internal network.
> >
> > With the web server behind the Proxy, if the web server is compromised
> > (eg. IIS Unicode vulnerability) then the entire internal network is open
> > to the attacker. The other configuration is better but it isn't the
> > only solution.
> >
> > -paul
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]