Hello Team,

We can inhibit X-Forwarded-For with *"header_access X-Forwarded-For deny all*" in squid configuration (*squid.conf*) file.

#Add below Commands in squid conf:
via off
forwarded_for off
follow_X_forwarded_for deny all

Since need to build squid from source for these limitations to work with some special flag for './configure'. eg : |./configure --enable-http-violations --prefix=/usr --includedir=/usr/include --datadir=/usr/share --bindir=/usr/sbin--libexecdir=/usr/lib/squid --localstatedir=/var --sysconfdir=/etc/squid --enable-auth="ntlm,basic" --enable-follow-x-forwarded-for|

Regards,
ViSolve Squid

On 9/28/2014 3:45 AM, Ahmd wrote:

hi all ,
im trying to make anonymous squid as i can
but no luck
akways been caughted by
http://www.ip-score.com/
???

how do i hide proxy information and let it as its comming from normal not proxy

is that possible ?

here is squid.conf

[root@ns504835 opt]# cat /etc/squid/squid.conf

###########Authentication######

auth_param basic children 20

auth_param basic realm Linux Class

auth_param basic program /lib/squid/basic_ncsa_auth /etc/squid/squid_user

auth_param basic credentialsttl 2 hours

auth_param basic casesensitive off

###

acl classx proxy_auth REQUIRED

###

dns_nameservers 8.8.8.8

# Recommended minimum configuration:

#

# Example rule allowing access from your local networks.

# Adapt to list your (internal) IP networks from where browsing

# should be allowed

acl localnet src 10.0.0.0/8     # RFC1918 possible internal network

acl localnet src 172.16.0.0/12  # RFC1918 possible internal network

acl localnet src 192.168.0.0/16 # RFC1918 possible internal network

acl localnet src fc00::/7       # RFC 4193 local private network range

acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines

acl SSL_ports port 443

acl Safe_ports port 80          # http

acl Safe_ports port 21          # ftp

acl Safe_ports port 443         # https

acl Safe_ports port 70          # gopher

acl Safe_ports port 210         # wais

acl Safe_ports port 1025-65535  # unregistered ports

acl Safe_ports port 280         # http-mgmt

acl Safe_ports port 488         # gss-http

acl Safe_ports port 591         # filemaker

acl Safe_ports port 777         # multiling http

acl CONNECT method CONNECT

#

# Recommended minimum Access Permission configuration:

#

# Deny requests to certain unsafe ports

http_access deny !Safe_ports

# Deny CONNECT to other than secure SSL ports

http_access deny CONNECT !SSL_ports

# Only allow cachemgr access from localhost

http_access allow localhost manager

http_access deny manager

http_access allow classx

# We strongly recommend the following be uncommented to protect innocent

# web applications running on the proxy server who think the only

# one who can access services on "localhost" is a local user

#http_access deny to_localhost

#

# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS

#

# Example rule allowing access from your local networks.

# Adapt localnet in the ACL section to list your (internal) IP networks

# from where browsing should be allowed

http_access allow localnet

http_access allow localhost

# And finally deny all other access to this proxy

http_access deny all

http_port 65000

# Uncomment and adjust the following to add a disk cache directory.

#cache_dir ufs /var/cache/squid 100 16 256

# Leave coredumps in the first cache dir

coredump_dir /var/cache/squid

#

# Add any of your own refresh_pattern entries above these.

#

refresh_pattern ^ftp: 1440    20%     10080

refresh_pattern ^gopher: 1440    0%      1440

refresh_pattern -i (/cgi-bin/|\?) 0     0%      0

refresh_pattern . 0       20%     4320

###############################

cache_effective_user squid

cache_effective_group squid

##############################

visible_hostname proxy

###########################################

forwarded_for off

request_header_access Allow allow all

request_header_access Authorization allow all

request_header_access WWW-Authenticate allow all

request_header_access Proxy-Authorization allow all

request_header_access Proxy-Authenticate allow all

request_header_access Cache-Control allow all

request_header_access Content-Encoding allow all

request_header_access Content-Length allow all

request_header_access Content-Type allow all

request_header_access Date allow all

request_header_access Expires allow all

request_header_access Host allow all

request_header_access If-Modified-Since allow all

request_header_access Last-Modified allow all

request_header_access Location allow all

request_header_access Pragma allow all

request_header_access Accept allow all

request_header_access Accept-Charset allow all

request_header_access Accept-Encoding allow all

request_header_access Accept-Language allow all

request_header_access Content-Language allow all

request_header_access Mime-Version allow all

request_header_access Retry-After allow all

request_header_access Title allow all

request_header_access Connection allow all

request_header_access Proxy-Connection allow all

request_header_access User-Agent allow all

request_header_access Cookie allow all

request_header_access X-Forwarded-For deny all

request_header_access Via deny all

request_header_access All allow all



any help ?

I need to test the proxy score on the website

Ip-score.com and want it 0 %

Is that possible to let squid don’t modify anything in the request andseems as not passed from proxy ?

regards



_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to