W3C home > Mailing lists > Public > ietf-http-wg-old@w3.org > May to August 1996

Re: New document on "Simple hit-metering for HTTP"

From: <hallam@ai.mit.edu>
Date: Tue, 20 Aug 96 16:00:22 -0400
Message-Id: <9608202000.AA03330@etna.ai.mit.edu>
To: mogul@pa.dec.com
Cc: hallam@ai.mit.edu, http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com
X-Mailing-List: <http-wg@cuckoo.hpl.hp.com> archive/latest/1431

>How does your technique (with the server asking the proxy to transmit
>a large log) work when there are multiple levels of proxy involved,
>some of which may be hidden behind firewalls?

There are two parts to the question, first how do multiple levels of
proxy work, second how does the scheme work through firewalls.

To support multiple levels of proxy the proxy must be coded to support
passthrough fetching of logs. That is the proxy must be bidirectional
so that if a server requests a logfile from the outermost proxy it must
interrogate any inferiors which offered log file exchange.

Support for firewalls is more complex and in this case not automatic.
Unless the firewall allows the log files to be fetched they cannot
cross the firewall. This is the behavior I would expect a firewall to 
enforce. After all the purpose of the firewall may be explicitly to
prevent leakage of such information. 

Received on Tuesday, 20 August 1996 12:58:45 UTC

This archive was generated by hypermail 2.3.1 : Wednesday, 7 January 2015 14:40:18 UTC