Re: proxying exploit attempts

From: Henrik Nordstrom <[email protected]>
Date: Sat, 23 Jan 1999 00:40:34 +0100

James Young wrote:

> #3 is currently my favorite. It blocks a class of attacks from anywhere.
> Unfortunately, it could break some valid scripts: I do not know.

Also, you won't be able to trap POST exploits using this method.

---
Henrik Nordstrom
Spare time Squid hacker
Received on Fri Jan 22 1999 - 18:25:03 MST

This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:44:07 MST