question about basics of creating a PROXY to MONITOR network activity

2QdxY4RzWzUUiLuE at potatochowder.com 2QdxY4RzWzUUiLuE at potatochowder.com
Thu Apr 8 10:41:15 EDT 2021


On 2021-04-09 at 00:17:59 +1000,
Chris Angelico <rosuav at gmail.com> wrote:

> Also, you'd better be really REALLY sure that your monitoring is
> legal, ethical, and not deceptive.

Not to mention *secure*.  Your monitor increases the attack surface of
the system as a whole.  If I break into your monitor, can I recover
passwords (yours, users, servers, etc.)?  Can I snoop on traffic?  Can I
snoop metadata (like when which users are talking to which servers) not
otherwise available on your network?


More information about the Python-list mailing list