<DIV>I keep reading that people are able to connect snort to their remote MySQL database using Stunnel. The mysqlclient on the client machine uses a random port outbound to 3306 on the remote MySQL host. I have seen many posts of the same configuration on how to send the MySQL data through stunnel but how can the config be true? I used the same config that is listed below and of course I connect just fine but that is because Snort sends to my remote MySQL database through mysqlclient outbound on a random port inbound to 3306 on the remote MySQL server and the data gets sent. Do people think that because the data is sent that it went through Stunnel? If you put a firewall up and block all ports but 3307 on both hosts which is used in these configs, the packet will never leave the client host because if you set logging on your firewall you will see that the connection is not trying to go out over port 3307 it is trying to go out over a random
port. Is there actually a way to bind mysqlclient to a port in order for me to use Stunnel? Also I don't see a way that Stunnel could trap the random port and then begin to encrypt using that random port. I am suprised, either I am missing something or all these people actually think the data they are sending is encrypted.</DIV>
<DIV> </DIV>
<DIV>--Client--<BR>; Use it for client mode<BR>client = yes</DIV>
<DIV>; Service-level configuration</DIV>
<DIV>[mysqls]<BR>accept = 3306<BR>connect = SQLserver:3307</DIV>
<DIV> </DIV>
<DIV>--Server--</DIV>
<DIV>[mysqls]<BR>accept = 3307<BR>connect = 3306<BR></DIV><p>
<hr size=1> <a href="http://us.rd.yahoo.com/evt=34442/*http://www.yahoo.com/r/hs">Start your day with Yahoo! - make it your home page </a>