Re: [squid-users] Pseudo proxy authentication (mapping of IP address to user name) in intercept mode.

2017-10-17 Thread Rafael Akchurin
Ok thanks again Amos.

The plan is then: 

- external acl helper gets the SRC and connects to REST server running on AD DC 
with IP <-> user mapping database
- replies with OK user=
- this name get's delivered to access log and ICAP/eCAP
- (optional) we are able to match the user to security group and apply 
designated filtering policy in our ICAP server.

Written above seems to work in the test lab.

Best regards,
Rafael Akchurin
Diladele B.V.

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Amos Jeffries
Sent: Tuesday, October 17, 2017 3:54 PM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] Pseudo proxy authentication (mapping of IP address 
to user name) in intercept mode.

On 17/10/17 22:39, Rafael Akchurin wrote:
> Hello everyone,
> 
> I would like to get your opinions on the subject.
> 
> *Problem*: admin needs to manage squid acls (and icap web filter
> settings) using security groups from Active Directory. For 
> non-technical reasons, setup of explicit proxy settings and thus 
> enforcing proxy authentication on Squid is not possible.
> 
> *Solution*:
> 
> 1.Deploy some agent on domain controller that would periodically 
> enumerate workstation IPs and get currently logged on users by WMI or 
> something like this. This is fine and already working in our project 
> at https://github.com/diladele/active-directory-inspector
> 
> 2.Let Squid somehow use the remote running inspector to match the IP 
> address to user names (and expose the user name to ICAP eventually). 
> May be anyone knows the type of helper/acl/annotation that needs to be 
> in running/configured on the Squid box?
> 

That kind of authorization is the purpose of the session and LDAP external ACL 
helpers. Though AFAIK neither of them uses the AD interface (YMMV if the Perl 
DB module can use AD as an SQL-like database).

You might be able to also be use the Basic auth LDAP helper from Squid-3.4+ as 
an external ACL helper. It will require some fiddling of the LDAP parameters 
and the ACL input format to make the external ACL input into the Basic-auth 
lookup.

Amos
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Pseudo proxy authentication (mapping of IP address to user name) in intercept mode.

2017-10-17 Thread Rafael Akchurin
Hello Amos,

Thanks for your responses.

What I do not understand completely - if we have intercept style of deployment, 
when browsers know nothing about the proxy - how basic (or any other type of 
authenticator) will work? I always thought browsers will discard proxy-auth 
responses just because they do not know if proxy is in-between.

May it be that only session helper is applicable in this case?

Best regards,
Rafael

-Original Message-
> *Problem*: admin needs to manage squid acls (and icap web filter
> settings) using security groups from Active Directory. For 
> non-technical reasons, setup of explicit proxy settings and thus 
> enforcing proxy authentication on Squid is not possible.
> 
> *Solution*:
> 
> 1.Deploy some agent on domain controller that would periodically 
> enumerate workstation IPs and get currently logged on users by WMI or 
> something like this. This is fine and already working in our project 
> at https://github.com/diladele/active-directory-inspector
> 
> 2.Let Squid somehow use the remote running inspector to match the IP 
> address to user names (and expose the user name to ICAP eventually). 
> May be anyone knows the type of helper/acl/annotation that needs to be 
> in running/configured on the Squid box?
> 

That kind of authorization is the purpose of the session and LDAP external ACL 
helpers. Though AFAIK neither of them uses the AD interface (YMMV if the Perl 
DB module can use AD as an SQL-like database).

You might be able to also be use the Basic auth LDAP helper from Squid-3.4+ as 
an external ACL helper. It will require some fiddling of the LDAP parameters 
and the ACL input format to make the external ACL input into the Basic-auth 
lookup.
 
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Pseudo proxy authentication (mapping of IP address to user name) in intercept mode.

2017-10-17 Thread Amos Jeffries

On 17/10/17 22:39, Rafael Akchurin wrote:

Hello everyone,

I would like to get your opinions on the subject.

*Problem*: admin needs to manage squid acls (and icap web filter 
settings) using security groups from Active Directory. For non-technical 
reasons, setup of explicit proxy settings and thus enforcing proxy 
authentication on Squid is not possible.


*Solution*:

1.Deploy some agent on domain controller that would periodically 
enumerate workstation IPs and get currently logged on users by WMI or 
something like this. This is fine and already working in our project at 
https://github.com/diladele/active-directory-inspector


2.Let Squid somehow use the remote running inspector to match the IP 
address to user names (and expose the user name to ICAP eventually). May 
be anyone knows the type of helper/acl/annotation that needs to be in 
running/configured on the Squid box?




That kind of authorization is the purpose of the session and LDAP 
external ACL helpers. Though AFAIK neither of them uses the AD interface 
(YMMV if the Perl DB module can use AD as an SQL-like database).


You might be able to also be use the Basic auth LDAP helper from 
Squid-3.4+ as an external ACL helper. It will require some fiddling of 
the LDAP parameters and the ACL input format to make the external ACL 
input into the Basic-auth lookup.


Amos
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


[squid-users] Pseudo proxy authentication (mapping of IP address to user name) in intercept mode.

2017-10-17 Thread Rafael Akchurin
Hello everyone,

I would like to get your opinions on the subject.

Problem: admin needs to manage squid acls (and icap web filter settings) using 
security groups from Active Directory. For non-technical reasons, setup of 
explicit proxy settings and thus enforcing proxy authentication on Squid is not 
possible.

Solution:


1.  Deploy some agent on domain controller that would periodically 
enumerate workstation IPs and get currently logged on users by WMI or something 
like this. This is fine and already working in our project at 
https://github.com/diladele/active-directory-inspector

2.  Let Squid somehow use the remote running inspector to match the IP 
address to user names (and expose the user name to ICAP eventually). May be 
anyone knows the type of helper/acl/annotation that needs to be in 
running/configured on the Squid box?

Thanks for anyone responding.

Best regards,
Rafael Akchurin
Diladele B.V.




___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users