Answer the question
In order to leave comments, you need to log in
Is traffic analysis possible if cntlm (tunneling) is used?
At work, a corporate proxy with restrictions.
The department has a dedicated Internet machine running Linux.
I wanted to download maven dependencies, I had to raise a special proxy - cntlm, which can log in via NTLM. Its side effect - allows you to bypass restrictions, i.e. when working through this proxy, nothing is blocked. Surprised, read - cntlm creates an HTTP tunnel. So, will admins be able to catch HTTP requests going through the tunnel, or will they be able to detect and block cntlm? Didn't find much on google.
Answer the question
In order to leave comments, you need to log in
will admins be able to catch HTTP requests going through the tunnel
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question