Search squid archive

Re: Solutions for transparent + proxy_auth?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> Drop it :

Oh boy, I can already tell this will be fun...

Unfortunately, I can't drop it.  I've been told to investigate this by
my boss because we have a coporate liability due to these boxes having
unrestricted net access.  If it can't be done, that's fine, but I need
some technical details as to why this specific scheme will not work. 
My boss won't like "drop it" as an answer. :-)

> http://squidwiki.kinkie.it/SquidFaq/InterceptionProxy

I'm confused by this link.  You tell me to "drop it" and point me to a
page that has two paragraphs about why it *shouldn't* be done, then
spends the next three pages describing all the ways it can be done?

> Try to *think* what you are saying, how in any sense would that global
> parent have any carry-thru info, about who was in front of the
> intercepting SQUID ?

Sorry, I'm just trying to gather some information here about what can
be done.  What "carry-thru" info is needed?  Why does it matter who is
in front of the intercepting cache?  If the parent cache uses
authentication, only authed machines will be allowed to connect?  How
is this any different than a typical squid peer/parent arrangement?


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux