On 9/03/2012 1:07 a.m., JC Putter wrote:
Amos,

Thank you for the reply.

Sorry I meant 3.0 STABLE 19.
Please at minimum upgrade to 3.0.STABLE26 then, if possible 3.1.19. There are a handful of major security vulnerabilities in between.


   The Zimbra Desktop client connects via port 443 and I have the standard ACL;

http_access deny !Safe_ports
http_access deny !SSL_ports

however when I change the ACL to (very insecure)

http_access allow CONNECT (without the exception of !SSL_ports) the zimbra 
client connects...

no too sure if my ACL is incorrect or if a need to add additional ports in the 
ACL however according to Zimbra 443 is the only one required.

The ACL you list above is not the defaults. The correct default is:

  http_access deny CONNECT !SSL_ports

SSL_Ports should only contain the HTTPS ports you permit requests to.


I ran wireshark trace I can confirm that the proxy offers all configured 
authentication schemes and the client responds with a Kerberos ticket.

Okay. It would seem to be some other part of the configuration. If you want a proper analysis please post your whole config (without the comments and empty lines though).

Amos

Reply via email to