having also not read the book, my guess would be that a transparent
proxy + firewall would increase security because people don't have the
the option to run SSH tunnels via the HTTP port.  A good example would
be years ago I ran a sock4 proxy on port 80 on my home firewall to
allow me to download MP3s off of napster from my work computer.

Had a squid proxy been in place I would have been forced to run it on 53  ;-p

-Bryan



On 3/22/08, Denise H. G. <[EMAIL PROTECTED]> wrote:
> "Ed Flecko" <[EMAIL PROTECTED]> writes:
>
> > Hi folks,
> > I'm reading a book on network security and it mentions "proxy
> > firewalls", so I'm wondering if an OpenBSD box with Squid installed
> > would fit this description? Or, are there other "proxy firewalls" the
> > author is referring to?
> >
> > The book mentions that although "proxy firewalls" tend to slow traffic
> > down, they are much more secure than a typical, "statefull packet
> > filtering" firewall. He says they will ignore the typical "network
> > discovery" methods, i.e. nmap, etc., etc.
> >
> > As a matter of curiosity, has anyone ran an nmap scan against an
> > OpenBSD box with Squid? What did the scan results indicate?
>
> I have an ancient box, which is an AMD K6 266MHz with 64M RAM, running
> OBSD 4.2 + pf + squid. I use it as a home router + firewall + WWW cache.
> Since it is running smooth, quiet and well, it just sits in one corner
> without my further investigations. But I don't know how `proxy' plus
> `firewall' would enhance security issues. Would you elaborate on it?
>
>
>
> >
> > Thank you,
> > Ed
>
> --
> Denise H. G. <darcsis AT gmail DOT com>

Reply via email to