Bevan wrote on 05/06/15 13:17:


Unless I am reading this wrong that is what I am reading here on the below links.

http://wiki.squid-cache.org/KnowledgeBase/HostHeaderForgery

https://squidproxy.wordpress.com/2014/12/19/squid-3-2-mythbusting-nat/


I observe that the NAT comment is under the *Workaround* heading and not under the heading of *Fix*.


What it says is untrusted users could talk to the squid process directly and do "bad things" Is there a risk of untrusted malicious users being on the network between pfsense and squid box? I expect all the untrusted users would be on the captive portal of the pfsense box.


Have you considered moving squid to the pfsense box, which satisfies a suggested workaround "ensure that NAT is performed on the same box as Squid"


To repeat - a network map or diagram would help with understanding your layout.



--
CF
_______________________________________________
Linux-users mailing list
[email protected]
http://lists.canterbury.ac.nz/mailman/listinfo/linux-users

Reply via email to