Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

HTTP Proxy CONNECT Loop DoS?

Running a Nessus vulnerability scan on my network, it detects the IP of my Sophos UTM having one:

MEDIUM: HTTP Proxy CONNECT Loop DoS

Description

The proxy allows the users to perform repeated CONNECT requests to itself.

This allow anybody to saturate the proxy CPU, memory or file descriptors.

** Note that if the proxy limits the number of connections
** from a single IP (e.g. acl maxconn with Squid), it is
** protected against saturation and you may ignore this alert.

Solution

Reconfigure your proxy so that it refuses CONNECT requests to itself.

Port   8080 / tcp / http_proxy    

Any ideas how I fix this?

Version 9.404-5

Thanks,

James.



This thread was automatically locked due to age.
Parents Reply
  • Hi Jack - Thanks for your investigations.

    Just tried it again, and got the same vulnerability warning. This time with UTM 9.405-5, and Nessus 6.8.1.

    Plugin Details
    Severity:    Medium
    ID:     17154
    Version:    $Revision: 1.12 $
    Type:         remote
    Family:       Web Servers
    Published:  2005/02/20
    Modified:    2013/01/25
    James.
Children