22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Do not “over cache” when using a caching proxy<br />

From a security best practices point of view, the single most relevant thing you<br />

want to ensure is that the a caching proxy caches what is cacheable and does<br />

not cache what is not cacheable. The results of ignoring no-cache directives by<br />

proxy servers configured as “bandwidth-savers” can range from authentication<br />

problems, to SSO not working as expected, to key pieces of functionality such as<br />

Sametime awareness not functioning.<br />

Lotus products actively rely on proxies not over-caching non-cacheable content,<br />

otherwise results are truly unpredictable.<br />

Troubleshooting tip: When debugging a connection between two entities,<br />

say Alice and Bob, if you have even the remote suspicion that somebody (your<br />

friendly network people or even your ISP) could have configured a transparent<br />

proxy in the middle between Alice and Bob, then look for this clue: additional<br />

response headers that include “via.”<br />

In many field cases, we have found (protocol analyzer in hand) that some of<br />

those transparent forward proxies over-cache or aggressively cache content,<br />

which means that they are configured to save bandwidth, no matter what.<br />

Thus, they behave as if “they know better” or “are smarter proxies,” in effect<br />

ignoring the “no-cache” and “expires” directives that the Web server may have<br />

imposed on the content.<br />

Your security policies should specify that network administrators should never<br />

over-cache contents. Most administrators will understand and agree to a<br />

sensible policy since security must not be compromised to achieve better<br />

network performance.<br />

Track client IP addresses<br />

By default, many reverse proxy servers will hide the client’s original IP address<br />

when making requests to back-end servers. Thus, all requests will appear to<br />

come from the same IP address. Privacy settings of many proxy products allow<br />

additional HTTP headers to be passed along with the requests. Thus, one can<br />

enable the forwarding of the client’s IP address to a destination server. This adds<br />

an additional HTTP header value containing the requesting client’s actual IP<br />

address. Which is of great security value since it enables you to track and<br />

troubleshoot any client connections.<br />

Turn off DNS lookups<br />

Many proxy servers allow for DNS lookups of connecting clients. This option<br />

causes the proxy server to resolve each incoming client’s IP address with a host<br />

Chapter 5. Proxies 185

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!