# its connections to the cliant and to the remote proxy.
# This can be a big security hole, since CONNECT-enabled proxies can
# be abused as TCP relays very easily.
# its connections to the cliant and to the remote proxy.
# This can be a big security hole, since CONNECT-enabled proxies can
# be abused as TCP relays very easily.