Running a Nessus vulnerability scan on my network, it detects the IP of my Sophos UTM having one:
MEDIUM: HTTP Proxy CONNECT Loop DoS
Description
The proxy allows the users to perform repeated CONNECT requests to itself.
This allow anybody to saturate the proxy CPU, memory or file descriptors.
** Note that if the proxy limits the number of connections
** from a single IP (e.g. acl maxconn with Squid), it is
** protected against saturation and you may ignore this alert.
Solution
Reconfigure your proxy so that it refuses CONNECT requests to itself.
Port 8080 / tcp / http_proxy
Any ideas how I fix this?
Version 9.404-5
Thanks,
James.
This thread was automatically locked due to age.