[EMAIL PROTECTED] writes:

> Thats all true, but what is the client to proxy protocol?

The initial connection setup from client to proxy is pretty much HTTP,
but the only information passed is the server hostname and port, which
would be available from firewall logging rules anyway.

All other communications between the client and the server are
encrypted, so it doesn't matter whether the proxy is inside the
firewall on a trusted network or not.

-- 
         Carey Evans  http://home.clear.net.nz/pages/c.evans/

Reply via email to