Search squid archive

Re: Would like to forward traffic without using SNAT to disguise source IP

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 28/09/11 07:37, Jeff MacDonald wrote:
Hi,

My setup is such that from home, I connect to a remote openvpn host
which is running IPtables.

That machine then redirects all traffic with rules like this:

iptables -t nat -A PREROUTING -i tun0 -s ! 10.17.0.3  -p tcp --dport
80 -j DNAT --to 10.17.0.3:3128
iptables -t nat -A POSTROUTING -o tun0 -s 10.111.111.0/24  -d
10.17.0.3 -j SNAT --to 10.111.111.1

Where 10.111.111.0/24 is my VPN, and 10.17.0.3 is my squid server.

The problem with this scenario, is that all requests appear to come
from 10.17.0.2 the openvpn server. Which defeats our purpose of
putting this proxy in place.. to catch a slacker who is wasting
company time.
Thoughts? Anyway we can use iptables better for this redirection?

You require TPROXY on the interception server.

 http://wiki.squid-cache.org/Features/Tproxy4

Amos
--
Please be using
  Current Stable Squid 2.7.STABLE9 or 3.1.15
  Beta testers wanted for 3.2.0.12


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux