Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Proxy help w/Linux and one or two NIC cards?



Scott Ehrlich wrote:
> My network setup at home consists of a Linksys broadband gateway/router
> connected to Comcast and several machines branching off of it.
> 
> I thought I might be able to get away with one NIC.
> Also please educate if I still need two NICs...
>
> My internal addressing is static 192.168 for all machines, which include
> the two NICs in the proxy box.

I can't help you with Squid, but it sounds like you're off track with 
the two NICs.

In a traditional firewall setup, 2 NICs are used in order to physically 
isolate the two network segments - one being your LAN, and the other 
being the WAN. It is then up to the firewall's rules to decide what can 
pass from one interface to the other.

In your situation, the Linksys router is located in the traditional 
firewall position, straddling the two network segments. (Internally, it 
has the logical equivalent of 2 NICs.) So if your proxy machine is 
inside the LAN, I don't see any value in having two NICs.

The lack of isolation is further emphasized by your comment that both 
NICs have IP addresses on the same network segment.


> ...also found the firewall-howto which has indicated (reminded me) of
> the possible need for two NICs, so I scrounged and installed a second NIC.

You've probably seen a blending of concepts, because proxies are often 
installed directly on the firewall machine, which has 2 NICs.


> I have Debian Woody installed on one box, and port forwarding enabled on
> the Linksys to point to the Debian box to reflect the open incoming
> proxy port.

It isn't clear to me why you needed to open ports on the Linksys to 
provide access to the Squid proxy server, unless that machine is also 
serving up web pages to the public Internet. Typically, a proxy works by 
accepting a request from a client computer on your LAN, and then it 
relays that request to a server on the Internet. As the proxy initiates 
the request directed to the Internet, it should pass through a typical 
NAT router without requiring any special rules.

If you want to boost security, place the machine running the proxy in a 
DMZ, which is like a second LAN that the firewall keeps physically 
isolated from your real LAN. That way if your proxy machine is breached 
(say due to a vulnerability in Squid), the attackers can't get at 
machines on your LAN.

The effectiveness of a DMZ is largely dependent on the kinds of rules 
you create for what is permitted to/from the DMZ. In this case, you'd 
permit LAN traffic to send HTTP requests to your proxy server, and you'd 
permit the proxy server to send HTTP requests out the the Internet, but 
you'd deny any connections from the Internet to the proxy server.

That last bit is the reason why a DMZ is probably overkill for a proxy 
server. Servers that don't accept inbound connections are generally no 
more vulnerable to attack than client computers already on your LAN.

(On a side note, your Linksys router might have a feature labeled DMZ, 
but in my experience DMZ is an exaggeration when applied to consumer 
routers. They typically use the DMZ label to mean that they'll port 
forward all inbound traffic to a designated machine which is on your LAN 
and not isolated.)

  -Tom




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org