Search squid archive

destination ip to splice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have a scenario which I want to disable ssl-bump for specific hosts ip
network masks.
In this scenario I want to allow all localnet(10.0.0.0/8, 192.168.0.0/16...)
https traffic to be spliced.
I tried to understand from the acl docs if there is such acl out there but
couldn't understand if it exists.
I am using squid in this scenario as a simple forward proxy and not in
intercept mode.
>From the next:
***** ACL TYPES AVAILABLE *****

	acl aclname src ip-address/mask ...	# clients IP address [fast]
	acl aclname src addr1-addr2/mask ...	# range of addresses [fast]
	acl aclname dst [-n] ip-address/mask ...	# URL host's IP
address [slow]
	acl aclname localip ip-address/mask ... # IP address the client
connected to [fast]

Is there a specific one that can help me with that or I should use
ssl::server_name_regex :
(^127\.0\.0\.1)|(^192\.168)|(^10\.)|(^172\.1[6-9])|(^172\.2[0-9])|(^172\.3[0
-1])

??

In intercept mode I can just use iptables to bypass the interception but in
a forward proxy mode I do not see another option.
This might not be the place but, would ever maybe such an option to bypass
squid parsing for specific destinations ie "splice" for special http
requests?

Thanks,
Eliezer

----
Eliezer Croitoru
Linux System Administrator
Mobile: +972-5-28704261
Email: eliezer@xxxxxxxxxxxx




_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux