Jump to content

Recommended Posts

  • 2 weeks later...
Guest Guest488
Posted

And here I was beginning to think that TCH really does rock :-(

 

Is there any particular reason why setting up a proxy is not allowed?

 

I know that a proxy uses more bandwidth than it does web-space, but as long as an account is within its allotted bandwidth for the paid hosting plan, what would be the problem?

:D

Posted

Can someone explain something to me? I thought a proxy server was used to protect and filter requests from a person inside a company LAN to a web server outside. Why would someone want to use TCH as a proxy server?

-kw

  • 4 months later...
Posted
Can someone explain something to me? I thought a proxy server was used to protect and filter requests from a person inside a company LAN to a web server outside. Why would someone want to use TCH as a proxy server?
While this is one use of a proxy server, it is certainly not the only one. I have seen them used in library systems to allow users to access special materials from home. I've seen them used in secure environments to hold unauthenticated hosts hostage until their credentials could be verified. Really, anytime a user is aided by having a program request pages on their behalf, some sort of proxying is going on. The possible applications are too numerous to list.

 

Proxy's ... may (accidentally) leave the server vulnerable to attack.

I would also have to disagree with this statement. An application that listens on a port must still run at the privilege level of the user who executed it. If I were to run a proxy application on a port and allow my application to be completely compromised, providing a shell to the attacker, the attacker would only have enough privileges to wipe out my entire space. The rest of the user space would remain unaffected as long as other users have set up their permissions correctly.

If we consider this scenario as "leaving the server vulnerable," then the same argument could be made to stop allowing any CGI programs as well. With the same ease of writing a vulnerable program that listens on a port, I could write a vulnerable program that listens to STDIN (as in CGI). Again, since the CGI program runs as me, the attacker would have complete control over my own space.

 

Disallowing proxies has no effect on TCH's rocking status. Frankly, this hosting company is so competently run that a simple, "because we said so" would be enough for me on many topics. That being said, it is always nice to have a reasonable explanation. You would have a difficult time convincing me that a proxy application puts more load on a server than a CGI script on average, but if this is the reasoning, so be it.

 

-Dave

  • 2 weeks later...
Posted

if you just need to filter out certain sites you might look into cybersitter, netnanny, cyberpatrol or other programs like that, they all give you control of what is or isnt viewable from the pc they are installed on.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...