Search squid archive

Re: Squid as interception proxy with pf

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



fre 2006-12-08 klockan 16:02 +0100 skrev Ghislain Garçon:

> I looked in kernel sources... and it's look like the lines above open  
> a device created by ipfilter... but pf doesn't need ipfilter in order  
> to work.

The question to ask is how does pf report the oiginal destination
address to the application?

There is three methods commonly used

a) ioctls on a special device. (ipfilter and derivates)

b) getsockopt on the filedescriptor. (linux iptables/netfilter)

c) getsockname() returning the original address as the local endpoint.
(linux ipchains, and some others)


Maybe pf falls into category 'c'. If so then it should work if you do
not specify any --enable-... options for transparent interception.


To test try the following from an intercepted client


telnet 12.160.37.9 80
GET / HTTP/1.0
[blank line]

should return the squid-cache.org home page, and http://12.160.37.9/
should get logged in Squid access.log.


Note: this can't be tested with a browser.

Regards
Henrik

Attachment: signature.asc
Description: Detta =?ISO-8859-1?Q?=E4r?= en digitalt signerad meddelandedel


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux