Search squid archive

Re: [squid-users] How often are Squid deployments configured to require authentication?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 5/23/05, Mark Romer <mromer@xxxxxxxx> wrote:
> I'm curious how often those who deploy squid configure it to require
> user authentication.  And what are the main reasons for requiring
> authentication?

AAA:  Authentication, Authorization and Accounting.
Are you who you claim to be?  Do you have permission to use the proxy?
Can we track back specific requests to an individual user?

On a small "home" network without any official security policies, I can
get away with being hyper-paranoid about personal privacy, restricting
access to specific ether addresses (MAC) and turning off logging.

On a slightly larger network with static IP addresses and trustworthy
internal users, I keep logs for a few days (or weeks) and rely on the
source IP for access control and logging.  This is enough to be able
to respond to RIAA/MPAA complaints and debug technical problems.

In very large networks with dynamic IP addresses and many diverse
LANS/WANS using DHCP servers not under centralized management,
the IP address is not a reliable identifier, and user authentication may
be necessary, or even a mandatory (regulatory, internal policy, etc)
requirement.


The only place I've ever actually used Squid with authentication was
where the business had a need to have different policies apply to
different users within the same DHCP scope; for example "students"
might have more restrictive ACLs than "teachers" while a reception desk
might only have access to Mapquest, OpenTable, and AnyWho.

Kevin


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux