RE: Weird log entries...

From: Cushing, David (David.Cushingat_private)
Date: Thu Mar 28 2002 - 06:25:13 PST

  • Next message: Michael Ward: "RE: Weird log entries..."

    Josh,
    
    It's not a bug, it's a feature.  The connect command is used to do what
    you guessed: create a tunnel to another location.
    
    http://www.ietf.org/rfc/rfc2817.txt
    
    5.2 Requesting a Tunnel with CONNECT
    
    A CONNECT method requests that a proxy establish a tunnel connection
    on its behalf. The Request-URI portion of the Request-Line is always
    an 'authority' as defined by URI Generic Syntax [2], which is to say
    the host name and port number destination of the requested connection
    separated by a colon:
    
       CONNECT server.example.com:80 HTTP/1.1
       Host: server.example.com:80
    
    Obviously, if you have a program that supports this feature, it should
    be locked down!
    
    -David
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Fri Mar 29 2002 - 14:46:35 PST