Look at the headers that Squid is sending to the server. It's likely they're mentioning Squid in some form. The simplest way to do this is with a packet capture via tcpdump/wireshark, or to turn up the logging in Squid via debug_options in squid.conf. On 28 September 2014 08:15, Ahmd <ahmed.zaeem@xxxxxxxxxxxx> wrote: > hi all , > im trying to make anonymous squid as i can > but no luck > akways been caughted by > http://www.ip-score.com/ > ??? > > how do i hide proxy information and let it as its comming from normal not > proxy > > is that possible ? > > > > > > here is squid.conf > > [root@ns504835 opt]# cat /etc/squid/squid.conf > > ###########Authentication###### > > auth_param basic children 20 > > auth_param basic realm Linux Class > > auth_param basic program /lib/squid/basic_ncsa_auth /etc/squid/squid_user > > auth_param basic credentialsttl 2 hours > > auth_param basic casesensitive off > > ### > > acl classx proxy_auth REQUIRED > > ### > > dns_nameservers 8.8.8.8 > > > > # Recommended minimum configuration: > > # > > > > # Example rule allowing access from your local networks. > > # Adapt to list your (internal) IP networks from where browsing > > # should be allowed > > acl localnet src 10.0.0.0/8 # RFC1918 possible internal network > > acl localnet src 172.16.0.0/12 # RFC1918 possible internal network > > acl localnet src 192.168.0.0/16 # RFC1918 possible internal network > > acl localnet src fc00::/7 # RFC 4193 local private network range > > acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) > machines > > acl SSL_ports port 443 > > acl Safe_ports port 80 # http > > acl Safe_ports port 21 # ftp > > acl Safe_ports port 443 # https > > acl Safe_ports port 70 # gopher > > acl Safe_ports port 210 # wais > > acl Safe_ports port 1025-65535 # unregistered ports > > acl Safe_ports port 280 # http-mgmt > > acl Safe_ports port 488 # gss-http > > acl Safe_ports port 591 # filemaker > > acl Safe_ports port 777 # multiling http > > acl CONNECT method CONNECT > > > > # > > # Recommended minimum Access Permission configuration: > > # > > # Deny requests to certain unsafe ports > > http_access deny !Safe_ports > > > > # Deny CONNECT to other than secure SSL ports > > http_access deny CONNECT !SSL_ports > > # Only allow cachemgr access from localhost > > http_access allow localhost manager > > http_access deny manager > > http_access allow classx > > # We strongly recommend the following be uncommented to protect innocent > > # web applications running on the proxy server who think the only > > # one who can access services on "localhost" is a local user > > #http_access deny to_localhost > > > > # > > # INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS > > # > > > > # Example rule allowing access from your local networks. > > # Adapt localnet in the ACL section to list your (internal) IP networks > > # from where browsing should be allowed > > http_access allow localnet > > http_access allow localhost > > > > # And finally deny all other access to this proxy > > http_access deny all > > > > http_port 65000 > > # Uncomment and adjust the following to add a disk cache directory. > > #cache_dir ufs /var/cache/squid 100 16 256 > > > > # Leave coredumps in the first cache dir > > coredump_dir /var/cache/squid > > > > # > > # Add any of your own refresh_pattern entries above these. > > # > > refresh_pattern ^ftp: 1440 20% 10080 > > refresh_pattern ^gopher: 1440 0% 1440 > > refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 > > refresh_pattern . 0 20% 4320 > > ############################### > > cache_effective_user squid > > cache_effective_group squid > > ############################## > > visible_hostname proxy > > ########################################### > > forwarded_for off > > request_header_access Allow allow all > > request_header_access Authorization allow all > > request_header_access WWW-Authenticate allow all > > request_header_access Proxy-Authorization allow all > > request_header_access Proxy-Authenticate allow all > > request_header_access Cache-Control allow all > > request_header_access Content-Encoding allow all > > request_header_access Content-Length allow all > > request_header_access Content-Type allow all > > request_header_access Date allow all > > request_header_access Expires allow all > > request_header_access Host allow all > > request_header_access If-Modified-Since allow all > > request_header_access Last-Modified allow all > > request_header_access Location allow all > > request_header_access Pragma allow all > > request_header_access Accept allow all > > request_header_access Accept-Charset allow all > > request_header_access Accept-Encoding allow all > > request_header_access Accept-Language allow all > > request_header_access Content-Language allow all > > request_header_access Mime-Version allow all > > request_header_access Retry-After allow all > > request_header_access Title allow all > > request_header_access Connection allow all > > request_header_access Proxy-Connection allow all > > request_header_access User-Agent allow all > > request_header_access Cookie allow all > > request_header_access X-Forwarded-For deny all > > request_header_access Via deny all > > request_header_access All allow all > > > > > > any help ? > > > > I need to test the proxy score on the website > > Ip-score.com and want it 0 % > > > > Is that possible to let squid don’t modify anything in the request andseems > as not passed from proxy ? > > > > regards > > > _______________________________________________ > squid-users mailing list > squid-users@xxxxxxxxxxxxxxxxxxxxx > http://lists.squid-cache.org/listinfo/squid-users > _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users