On Tue, 17 Aug 2010 14:00:57 -0500, Dean Weimer dwei...@orscheln.com
wrote:
I know when using squid as an intercept proxy it can't do authentication
as the clients don't know it's there, but do any of you out there know
if
you can use it with a parent proxy that requires authentication?
The specific scenario I am considering is Squid in DMZ with WCCPv2 used
in
conjunction with a Cisco ASA 5520 firewall and an external (Websense
filtering) proxy that requires authentication, both NTLM and basic
authentication is supported.
Clients
|
Cisco ASA5520 -WCCPv2- Squid 3.1.6 (In DMZ) -- Secondary Internet
Connection -- Parent Proxy Service
|
Internet
We are currently using auto-detect, but continually keep running into
applications that don't recognize auto-detect, or sometimes don't even
have
the ability to read a configuration script. I am trying to come up with
a
way to alleviate the user's issues, without losing our local cache. And
keeping the HR and Legal departments happy by continuing to filter
websites
with content that some could find offensive, as well as blocking unsafe
(malware/spyware) websites.
1) IF the client thinks its talking to the parent proxy. cache_peer
login=PASS (or login=PASSTHRU) will pass on the credentials without
requiring auth within Squid.
2) IF Squid itself needs to login to the parent. cache_peer login= with
username:password will insert the given login to relayed requests.
NP: Older Squid only allow Basic auth protocol credentials to be added
this way. 3.2 brings the ability to do Negotiate/Kerberos as well. NTLM
remains a sticky problem.
This login= is only relevant once on a cache_peer entry. So its one or the
other can be used at once. #2 is probably better/simpler for you since the
clients are not involved in the auth process.
Hope this helps.
Amos