Search squid archive

Re: transparent proxy with authentication

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks Merton for explaning.

What if the design is changed from wccp to a redirection level7 switch such as foundry serveriron? L7 switch redirect http traffic to squids. Will this be able to design provide authentication from squid?

If transparent squid cant provide authentication due to the complications, would you recommend we get all users to enter proxy IP at their own browser before they can browse, so that authentication can still be provided? If there is a proxy pool (a few proxies for redundancy), then I may use a L7 content switch to provide a virtual proxy IP for all user browser to point to, then the content switch will route the user to the least loaded squid. All squid will definitely be now be authenticating users against the Sun Ldap server.

I understand that servers may be affected by this. However, I could set at firewall that only IP at Server Farm can have http direct to internet, bypassing proxies.

To prevent users from going directly to Internet, firewall will block their IP from http access direct to internet.

The objective of this is to enable logging of login with url accesses on shared computers. Such computers are like those in computer labs where anyone can use to access to internet. If you do have alternative control mechanism, please advise.

Thanks again.

Kah Yi

-------- Original Message --------
From: Merton Campbell Crockett <mcc@xxxxxxxxxxxxxxx>
To: squid-users@xxxxxxxxxxxxxxx
Subject: Re: transparent proxy with authentication
Date: 25/10/2005 10:47

On Monday 24 October 2005 18:36, Chin Kah Yi wrote:

Dearest squid expert out there,

Don't mind me being asking again - but why was authentication designed
not to work with wccp? If transparent proxy design is required together
with authentication, is there any alternative I could work on?


With WCCP you are intercepting the HTTP request from the HTTP client. The HTTP client assumes that it is communicating with the HTTP server. If the HTTP intercept proxy were to request authentication, you would have one of the following problems.

   (1)	The HTTP client would present the credentials that it saved from
	the last time that it accessed the HTTP server to the HTTP intercept
	proxy.  These credentials would fail the authentication tests and
	access would be denied.
   (2)	If the HTTP client did not have any credentials saved, the user would
	present the credentials requested by the HTTP intercept proxy.  The HTTP
	client would save the authenticated credentials.  If the HTTP server does
	not require authentication, there is no problem.
   (3)	If the HTTP server requires authentication, the HTTP client would
	present the credentials required by the HTTP intercept proxy.  The
	authentication would fail and the HTTP client would be prompted to
	provide new credentials.

Obviously, this leads to a condition where the HTTP client needs to supply multiple credentials on every access. It is important to note that not all HTTP clients are browsers (Firefox, Internet Explorer, Netscape, Safari, etc.). Many are applications or services such as AIM, Jabber, Real Audio, etc.

It might be possible to implement authentication in an HTTP intercept proxy were realms consistently used and understood by all HTTP clients and servers. However, the last time that I looked at this problem (ca. 1999), I discovered that while HTTP clients tended to deal with realms correctly there was a wide variance in the way realms were implemented in HTTP servers with Microsoft IIS being the biggest problem.

Merton Campbell Crockett



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux