> > On 16/02/2013 3:23 p.m., James Harper wrote: > > On a Windows desktop there are often a bunch of system services that > make http connections, either running as a system account or running as a > user but that don't know how to authenticate. The list of these exceptions is > tedious to maintain so it would be good to be able to authorise the users IP > address once they have successfully authenticated to squid, sort of like the > old style 'pop before smtp' auth used to work. > > Tedious to maintain? what exactly are you listing? > I list services by approving and whitelisting destination domains. > That is no much work, as the listing only needs adapting when the first > time you encounter a service. A second, third... thousandth client > system using that service does not make any difference. > That's what I thought originally, but things like CRL's (every CA seems to use a new one - I've 'fixed' java 5 times in the past week) and skydrive (breaks every month or so as Microsoft change things) require continual maintenance and doesn't fail nicely. > Some Warnings first: > > * Be careful with this. It is not very safe to trust an IP just because > you saw credentials from it earlier on a completely different connection. Credentials will time out > * Clients are able to run proxy software and share their internet > connection with the world very easily these days. That's true of the existing username/password authentication anyway. But the site is small enough that we'd notice. > * You loose all tracking of any infections or malicious software they > may be infected with. How so? Username is first logged against IP address, then IP address is logged. Tracking is easy. > * You loose the ability for users to share machines. User A can shut > down the machine, user B restart it and if they are fast enough the > proxy shares the session started by user A. I thought about that. Firstly, the above scenario doesn't happen, and if it did the login records are present on the PC anyway. > * the above means you loose the ability to identify which user is doing > what actions (once the IP-based session is active the credentials are > not used or logged). But the IP address is, so the problem becomes a reporting problem. > > Anyways.... > > What you want to look at is the session helper, with its active mode (-a > command line parameter). > http://www.squid- > cache.org/Versions/v3/3.2/manuals/ext_session_acl.html > Thanks for taking the time to write all of this. Now I know that what I want to do is possible I can consider whether it is the best road forward. Have you ever considered integrating a SOCKS style proxy into squid? It requires a smart client of course but I can do that much under Windows. James