On Wed, May 12, 2004 at 11:07:24PM +1000, Robert Collins wrote:
> Lets be clear here:
> I'm all for blocking port 80 flat out and requiring a proxy to be used.
> In that scenario illegitimate programs fail nicely  :}.
> 
> I'm also very pro network IDS's combined with firewall rules to
> dynamically drop, block or interrupt sessions. 
> 
> None of the above lead to the damaged semantics of hijacking, and they
> allow all the monitoring and blocking you could want.

Rob,
Is there some way (the easier the better) that allows you
to do things like snooping POST'd data, or even just keeping
stats on the size of POST'd data.

Matt
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to