Hi
I have tried to use only Kerberos authentication, but didn't work! I have
already used the 3 way below:
1) auth_param negotiate program /usr/lib/squid3/negotiate_kerberos_auth
2) auth_param negotiate program /usr/lib/squid3/negotiate_kerberos_auth -s
GSS_C_NO_NAME -i
3) auth_param negotiate pr
On 5/09/2016 10:41 a.m., Marcio Demetrio Bacci wrote:
> I have used debug_options 11,2 in squid.conf file. After I have following
> results in logs files:
>
> /var/log/squid3/access.log
> 1473026084.048253 192.168.200.85 TCP_MISS_ABORTED/000 0 POST
> http://m.addthis.com/live/red_lojson/100eng
Thanks for your reply.
The 13-year old child in me says "I want it fixed yesterday"
since false positives are very painful and cannot always
be prevented since the environment where Squid works is
not always that easy to control.
You mentioned earlier that a fix will probably go in squid 5
which
I have used debug_options 11,2 in squid.conf file. After I have following
results in logs files:
/var/log/squid3/access.log
1473026084.048253 192.168.200.85 TCP_MISS_ABORTED/000 0 POST
http://m.addthis.com/live/red_lojson/100eng.json? marcio HIER_NONE/- -
1473026086.275 0 192.168.200.85 T
On 31/08/2016 5:25 a.m., Marcus Kool wrote:
> Do I understand it correctly that Squid in normal proxy mode
> allows malware to do a CONNECT to any destination, while in
> transparent proxy mode does extra security checks which causes
> some regular (non-malware) clients to fail?
Intercepted traff
On 31/08/2016 1:55 p.m., hibandx wrote:
> So, i have an squid configured and ok with ad 2012, but the acl
> Proxy_restrito is not working...
>
> This acl is for
>
> any solution?
What version of Squid are you using?
the "squid -v" command will show that detail.
>
> This is my conf is for den
On 5/09/2016 3:31 a.m., Ahmed Alzaeem wrote:
> hi amos I’m curious to have my proxies not being detected from others .
>
Then you choose to make your clients and network internal structore
entirely visible to the upstream servers.
You can hide your network structure and clients, or you can hide
On 5/09/2016 2:40 a.m., Wesley Whitteker wrote:
> Hello Folks, I've been doing some testing with Squid and am currently
> using it to decrypt HTTPS flows (i.e. MITM Proxy). I also have the
> C-ICAP feature working.
>
> Now, I'm trying to determine if Squid has the capabilities to send a
> copy of
On 4/09/2016 7:40 p.m., Omid Kosari wrote:
> Because squid should be really transparent tproxy . I want to remove its
> footprints.
>
"transparent" != "invisible".
"Transparent" in HTTP terms means the proxy *is* visible, and relaying
messages, but without transforming them. Making the source ag
Hello Folks,
I've been doing some testing with Squid and am currently using it to decrypt
HTTPS flows (i.e. MITM Proxy). I also have the C-ICAP feature working.
Now, I'm trying to determine if Squid has the capabilities to send a copy of
decrypted HTTPS traffic out a particular port on the HW
Because squid should be really transparent tproxy . I want to remove its
footprints.
--
View this message in context:
http://squid-web-proxy-cache.1019090.n4.nabble.com/reply-header-access-Server-deny-IF-Server-squid-tp4679338p4679341.html
Sent from the Squid - Users mailing list archive at Nab
11 matches
Mail list logo