having also not read the book, my guess would be that a transparent proxy + firewall would increase security because people don't have the the option to run SSH tunnels via the HTTP port. A good example would be years ago I ran a sock4 proxy on port 80 on my home firewall to allow me to download MP3s off of napster from my work computer.
Had a squid proxy been in place I would have been forced to run it on 53 ;-p -Bryan On 3/22/08, Denise H. G. <[EMAIL PROTECTED]> wrote: > "Ed Flecko" <[EMAIL PROTECTED]> writes: > > > Hi folks, > > I'm reading a book on network security and it mentions "proxy > > firewalls", so I'm wondering if an OpenBSD box with Squid installed > > would fit this description? Or, are there other "proxy firewalls" the > > author is referring to? > > > > The book mentions that although "proxy firewalls" tend to slow traffic > > down, they are much more secure than a typical, "statefull packet > > filtering" firewall. He says they will ignore the typical "network > > discovery" methods, i.e. nmap, etc., etc. > > > > As a matter of curiosity, has anyone ran an nmap scan against an > > OpenBSD box with Squid? What did the scan results indicate? > > I have an ancient box, which is an AMD K6 266MHz with 64M RAM, running > OBSD 4.2 + pf + squid. I use it as a home router + firewall + WWW cache. > Since it is running smooth, quiet and well, it just sits in one corner > without my further investigations. But I don't know how `proxy' plus > `firewall' would enhance security issues. Would you elaborate on it? > > > > > > > Thank you, > > Ed > > -- > Denise H. G. <darcsis AT gmail DOT com>