On Wednesday 27 March 2002 16.17, Jean-Michel Hemstedt wrote:

> - If your proxy allows "CONNECT" requests, then virtually anything
>   can pass through it, and HTTPS decrypting proxy does not make sense.

A proxy can in theory verify that the supposedly SSL stream looks like a SSL 
stream and not something else.. The SSL and TLS data streams are quite 
structured.

> It doesn't handle currently any of them. Fragmentation can be solved by
> defragmenting incoming packets. (they are destined to the local ip stack
> anyway)

Defragmentation is defenitely needed for this thing to be used in production. 
For experimentation conntrack can be used to defragment..

> ICMP can be handled in the prerouting hook looking up possible transparent
> proxy entries.

Where is the "possible transparent proxy entries" defined? Internally in 
TPROXY, or in the host IP stack socket table?

I guess this would be the rule table telling what should be diverted by 
TPROXY, which from my understanding would be your iptables ruleset...

> > Also, who is responsible for making sure the application protocol is
> > NAT:ed properly in TPROXY.
>
> Of course the proxy itself.

Good.

> conntrack will not be involved in TPROXY, though I want them to
> interoperate.

Of course. Just mentioned it as a reference on why I see that one cannot 
really use netfilter NAT for truly transparent proxying as it is today.

Regards
Henrik

Reply via email to