On 3/27/07, Ariz Jacinto <[EMAIL PROTECTED]> wrote:
Hi Junix, what software / rules did you use to drop those packets?
Actually, I am using ISA 2004, In one of the firewall rules of ISA , you right click on and there goes configure HTTP and on the header TAB, I just put block all headers with "X-Forwarded-For", "Via" and http 1.0 (although I dont get the reason why this last one should be blocked), out of curiousity, I just blocked it as well. Hayyy, kainis. But I configure a squid proxy server to test a "proxy" connection and even with that header blocking, it still works. Since I dont know much in using ethereal and/or other pocket sniffer that reads and analyze such HEADER, I'm kinda stuck and left thinking that maybe squid doesn't use put this X-Forwarded-For for its clients request to the parent proxy. hayyy more googling I guess. I will try this Header blocking in Squid. Hopefully I will it will yield a different result. ps, I am chaining ISA, dansguardian and squid and it works like a charm except for that rugue proxy being used against me. hayyy
_________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Read the Guidelines: http://linux.org.ph/lists Searchable Archives: http://archives.free.net.ph

