Search squid archive

Re: Squid, squidGuard and Interception proxying

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 23 May 2011 13:55:52 -0500, Brent Norris wrote:
List,
I currently have squid setup as an interception proxy in my school
district.  I also have it configured on our static network machines.
I understand that squid will not work as an interception proxy for
anything that isn't standard HTTP, according to documentation
available on the web.

What I was wondering though is if there was a way that I could set my
Linux server up to accept other kinds of traffic (HTTPS, Streaming
media) and pass that traffic on without really proxying it, but still
comparing it against my squidguard lists?

Think about that. Comparing random IP packets against squidguard HTTP rules.

IP packet handling is a firewall duty. You will have to duplicate your SG rules in the firewall.


I do a lot of filtering of objectionable sites for our students in
squidguard and it would be a very big hole to all those sites through
if the students are using HTTPS to get to them.

I am not really set in any specific way.  If someone has a better
idea about how I should go about it, please feel free to give me any
pointers that you might have.

We officially recommend using interception as a very *last* resort. It is dangerous with nasty side effects, just like NAT on which it is based. You have just noticed one of the security holes.

The recommended network setup has multiple ways software can find its way to the proxy. WPAD and PAC, local environment variable on fixed machines. The details are outlined in the FAQ at http://wiki.squid-cache.org/SquidFaq/ConfiguringBrowsers


Amos


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux