Re: [PATCH] OAuth 2.0 Bearer authentication

2014-08-09 Thread Alex Rousskov
entry instead of checking the cache >> state every hour. > I agree. However this is a common algorithm for all of Squid > authentication types. Updating it should be done as a separate action > and cover more than just this auth scheme. In particular the core cache > code is share

Re: [PATCH] OAuth 2.0 Bearer authentication

2014-08-09 Thread Amos Jeffries
However this is a common algorithm for all of Squid authentication types. Updating it should be done as a separate action and cover more than just this auth scheme. In particular the core cache code is shared by Basic and Digest. >> +// only clear tokens out of cache after

Re: [PATCH] OAuth 2.0 Bearer authentication

2014-08-04 Thread Alex Rousskov
On 07/31/2014 03:29 AM, Amos Jeffries wrote: > A garbage collection TTL "cleanup_interval" is configurable and removes > cache entries which have been stale for at least 1 hr. While some old code still uses periodic cleanup, I think we should avoid adding more code like that. Periodic cleanup le

[PATCH] OAuth 2.0 Bearer authentication

2014-07-31 Thread Amos Jeffries
RFC 6750 OAuth 2.0 Authorization Framework: Bearer Token Usage The attached patch adds a minimal implementation of Bearer authentication scheme to Squid. It consists of three components: 1) Squid build system infrastructure for building Bearer authentication 2) A testing fake-auth helper

Re: [PATCH] Fix documentation for key_extras authentication helper parameter

2014-01-30 Thread Amos Jeffries
xpanded key_extras value is added to the Squid credentials cache and, > hence, will affect authentication. > > Please review that the added documentation cover most of the problems > will may appear by key_extras misuse. > Problem: s/ dentical / identical / I doubt we truly kno

[PATCH] Fix documentation for key_extras authentication helper parameter

2014-01-29 Thread Tsantilas Christos
affect authentication. Please review that the added documentation cover most of the problems will may appear by key_extras misuse. Regards, Christos === modified file 'src/cf.data.pre' --- src/cf.data.pre 2014-01-12 17:51:12 + +++ src/cf.data.pre 2014-01-27 10:06:21 + @@ -313,

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-12-06 Thread Tsantilas Christos
Amos Jeffries wrote: >>> On 23/11/2013 5:42 a.m., Tsantilas Christos wrote: >>>> I am sending a new patch which I hope meets the requirements. >>>> >>>> It supports only one %key_extras authentication scheme parameter. This >>>> is just

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-12-05 Thread Tsantilas Christos
ending a new patch which I hope meets the requirements. >>> >>> It supports only one %key_extras authentication scheme parameter. This >>> is just append to the current request line format. >> >> >> Thank you. Looks much better. >> >> >>

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-22 Thread Amos Jeffries
On 23/11/2013 5:42 a.m., Tsantilas Christos wrote: > I am sending a new patch which I hope meets the requirements. > > It supports only one %key_extras authentication scheme parameter. This > is just append to the current request line format. Thank you. Looks much better.

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Alex Rousskov
On 11/19/2013 07:46 PM, Amos Jeffries wrote: > On 20/11/2013 12:49 p.m., Alex Rousskov wrote: >> On 11/19/2013 04:01 PM, Amos Jeffries wrote: > > >>> If you want to omit it from this patch and do it as a second one that >>> would be okay. >> >> I do not like the idea of increasing the amount of w

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Amos Jeffries
On 20/11/2013 12:49 p.m., Alex Rousskov wrote: > On 11/19/2013 04:01 PM, Amos Jeffries wrote: >> If you want to omit it from this patch and do it as a second one that >> would be okay. > > I do not like the idea of increasing the amount of work further by > splitting this feature into two. I thi

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Alex Rousskov
On 11/19/2013 04:01 PM, Amos Jeffries wrote: > On 2013-11-20 08:11, Alex Rousskov wrote: >> On 11/19/2013 02:54 AM, Tsantilas Christos wrote: >> >>> My understanding is that we need: >>> 1) Allow configuring the request format using one of the following: >>>a) Use a request_format configuration

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Amos Jeffries
On 2013-11-20 08:11, Alex Rousskov wrote: On 11/19/2013 02:54 AM, Tsantilas Christos wrote: My understanding is that we need: 1) Allow configuring the request format using one of the following: a) Use a request_format configuration parameter plus the %credentials formating code b) Use th

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Alex Rousskov
On 11/19/2013 02:54 AM, Tsantilas Christos wrote: > My understanding is that we need: > 1) Allow configuring the request format using one of the following: >a) Use a request_format configuration parameter plus the > %credentials formating code >b) Use the following request format: >

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Tsantilas Christos
On 11/18/2013 10:11 PM, Alex Rousskov wrote: > On 11/18/2013 10:51 AM, Tsantilas Christos wrote: >> On 11/17/2013 07:00 AM, Alex Rousskov wrote: >>> On 11/16/2013 08:01 PM, Amos Jeffries wrote: On 17/11/2013 3:21 p.m., Alex Rousskov wrote: >auth_param digest key_suffix "%lp" >>> H

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-19 Thread Tsantilas Christos
On 11/18/2013 10:39 PM, Amos Jeffries wrote: > On 2013-11-19 08:47, Alex Rousskov wrote: >> On 11/18/2013 10:57 AM, Tsantilas Christos wrote: >>> On 11/15/2013 05:11 PM, Amos Jeffries wrote: in src/auth/ntlm/UserRequest.cc: * the YR and KK are lookups codes, not part of the credentia

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-18 Thread Amos Jeffries
On 2013-11-19 08:47, Alex Rousskov wrote: On 11/18/2013 10:57 AM, Tsantilas Christos wrote: On 11/15/2013 05:11 PM, Amos Jeffries wrote: in src/auth/ntlm/UserRequest.cc: * the YR and KK are lookups codes, not part of the credentials. They must be first on the helper query line and not manipula

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-18 Thread Alex Rousskov
On 11/18/2013 10:51 AM, Tsantilas Christos wrote: > On 11/17/2013 07:00 AM, Alex Rousskov wrote: >> On 11/16/2013 08:01 PM, Amos Jeffries wrote: >>> On 17/11/2013 3:21 p.m., Alex Rousskov wrote: auth_param digest key_suffix "%lp" >> >>> Halfway: key_extras ? >> >> >> Works for me. > > Jus

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-18 Thread Alex Rousskov
On 11/18/2013 10:57 AM, Tsantilas Christos wrote: > On 11/15/2013 05:11 PM, Amos Jeffries wrote: >> in src/auth/ntlm/UserRequest.cc: >> >> * the YR and KK are lookups codes, not part of the credentials. They >> must be first on the helper query line and not manipulable by the admin. >> - same prob

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-18 Thread Tsantilas Christos
On 11/17/2013 07:00 AM, Alex Rousskov wrote: > On 11/16/2013 08:01 PM, Amos Jeffries wrote: >> On 17/11/2013 3:21 p.m., Alex Rousskov wrote: >>>auth_param digest key_suffix "%lp" > >> Halfway: key_extras ? > > > Works for me. Just to summarize. Is this means that the request_realm renamed

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-18 Thread Tsantilas Christos
On 11/15/2013 05:11 PM, Amos Jeffries wrote: > in src/auth/ntlm/UserRequest.cc: > > * the YR and KK are lookups codes, not part of the credentials. They > must be first on the helper query line and not manipulable by the admin. > - same problem in Negotiate as well. If we remove the lookupcodes

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-16 Thread Alex Rousskov
On 11/16/2013 08:01 PM, Amos Jeffries wrote: > On 17/11/2013 3:21 p.m., Alex Rousskov wrote: >>auth_param digest key_suffix "%lp" > Halfway: key_extras ? Works for me. Alex.

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-16 Thread Amos Jeffries
On 17/11/2013 3:21 p.m., Alex Rousskov wrote: > On 11/15/2013 11:49 PM, Amos Jeffries wrote: >>>> Now about the name: "realm_format" is a bad choice IMO because some >>>> folks will think that it controls the format of the authentication realm >>>>

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-16 Thread Alex Rousskov
On 11/15/2013 11:49 PM, Amos Jeffries wrote: >> > Now about the name: "realm_format" is a bad choice IMO because some >> > folks will think that it controls the format of the authentication realm >> > string displayed to the user (for schemes where we can spec

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-15 Thread Amos Jeffries
t;> The attached patch add the "auth_param request_format" and "auth_param >>>>> request_realm" to proxy authentication schemes. >>>>> >>>>> The request_format value used to define the format of the helper request >>>>> li

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-15 Thread Alex Rousskov
; and "auth_param >>>> request_realm" to proxy authentication schemes. >>>> >>>> The request_format value used to define the format of the helper request >>>> line. It is a "quoted string" with logformat %macro support. A new >>&

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-15 Thread Amos Jeffries
On 16/11/2013 6:13 a.m., Alex Rousskov wrote: > On 11/15/2013 08:11 AM, Amos Jeffries wrote: >> On 30/10/2013 5:13 a.m., Tsantilas Christos wrote: >>> The attached patch add the "auth_param request_format" and "auth_param >>> request_realm&quo

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-15 Thread Alex Rousskov
On 11/15/2013 08:11 AM, Amos Jeffries wrote: > On 30/10/2013 5:13 a.m., Tsantilas Christos wrote: >> The attached patch add the "auth_param request_format" and "auth_param >> request_realm" to proxy authentication schemes. >> >> The request_forma

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-15 Thread Amos Jeffries
On 30/10/2013 5:13 a.m., Tsantilas Christos wrote: > Hi all, > > The attached patch add the "auth_param request_format" and "auth_param > request_realm" to proxy authentication schemes. > > The request_format value used to define the format of the helper

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-15 Thread Tsantilas Christos
On 11/14/2013 10:01 PM, Amos Jeffries wrote: > On 2013-11-14 22:36, Tsantilas Christos wrote: >> ping for this patch... >> >> If not objection I will commit this patch to trunk >> > > I'd like to have another read through it before that happens. Sorry. > Will try to get that done later today. No

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-14 Thread Amos Jeffries
On 2013-11-14 22:36, Tsantilas Christos wrote: ping for this patch... If not objection I will commit this patch to trunk I'd like to have another read through it before that happens. Sorry. Will try to get that done later today. Amos

Re: [PATCH] Add auth_param request_format, request_realm to proxy authentication schemes

2013-11-14 Thread Tsantilas Christos
ping for this patch... If not objection I will commit this patch to trunk Regards, Christos On 10/29/2013 06:13 PM, Tsantilas Christos wrote: > Hi all, > > The attached patch add the "auth_param request_format" and "auth_param > request_realm" to proxy

[RFC] Configurable authentication helper requests

2013-10-10 Thread Alex Rousskov
est_format should come from logformat codes where available (and we can add new ones where needed). I used more readable names for illustration purposes only. This feature is needed for Squid admins that have to use different internal authentication lookup algorithms(*) depending on various transaction

Re: [PATCH] cert based client authentication

2012-09-05 Thread Tsantilas Christos
t;> >> The TLS/SSL options configured with http_port configuration parameter >> does not used to generate SSL_CTX context objects used to establish SSL >> connections. This is means that certificate based authentication, or SSL >> version selection and other SSL/TLS http

Re: [PATCH] cert based client authentication

2012-08-31 Thread Tsantilas Christos
gt; connections. This is means that certificate based authentication, or SSL > version selection and other SSL/TLS http_port options does not work for > ssl-bumped connection. > > This patch fixes this problem. > > This is a Measurement Factory project >

[PATCH] cert based client authentication

2012-08-09 Thread Tsantilas Christos
TLS/SSL Options does not apply to the dynamically generated certificates The TLS/SSL options configured with http_port configuration parameter does not used to generate SSL_CTX context objects used to establish SSL connections. This is means that certificate based authentication, or SSL version

Re: ntlm authentication concurrency

2011-12-14 Thread Henrik Nordström
ons 2011-12-14 klockan 13:46 +1300 skrev Amos Jeffries: > The reason why it is not supported is that NTLM (and Negotiate to a > lesser degree) protocol is stateful and spreads pieces of the > challenge/token-exchange/credentials-response over several HTTP > requests. To handle this each hel

Re: ntlm authentication concurrency

2011-12-13 Thread Amos Jeffries
ce. Among those features, there is one missing and I cannot get why : ntlm authentication concurrency. You have released a multiplexer for old helpers (and I have written a new one with some new features like wiping unused helpers,...) and Squid supports the protocol, but actually concurrency on 3

ntlm authentication concurrency

2011-12-13 Thread Vincent Miszczak
why : ntlm authentication concurrency. You have released a multiplexer for old helpers (and I have written a new one with some new features like wiping unused helpers,...) and Squid supports the protocol, but actually concurrency on 3.1 (we are talking of production suitable products) cannot be

Re: Authentication against SQLite

2011-06-15 Thread Amos Jeffries
On Thu, 16 Jun 2011 00:51:36 +0430, Majid Azimi wrote: Hi guys, Are squid core developers interested in providing authentication against SQLite? the current auth_db helper is only authenticating against MySQL. The DB helper accepts any SQL database. MySQL is only the default. Use the --dsn

Authentication against SQLite

2011-06-15 Thread Majid Azimi
Hi guys, Are squid core developers interested in providing authentication against SQLite? the current auth_db helper is only authenticating against MySQL.

Re: [PATCH] NTLM authentication broken for Mozilla/3.0 User-Agents

2011-01-25 Thread Amos Jeffries
On 25/01/11 20:56, Fabian Hugelshofer wrote: Hi, On 12/01/11 00:14, Henrik Nordström wrote: tis 2011-01-11 klockan 11:37 +0100 skrev Fabian Hugelshofer: What do you think about removing the special handling for Mozilla/3 and Netscape/3 agents from HttpMsg.cc? +1 from me. How large is the

[PATCH] NTLM authentication broken for Mozilla/3.0 User-Agents

2011-01-24 Thread Fabian Hugelshofer
Hi, On 12/01/11 00:14, Henrik Nordström wrote: tis 2011-01-11 klockan 11:37 +0100 skrev Fabian Hugelshofer: What do you think about removing the special handling for Mozilla/3 and Netscape/3 agents from HttpMsg.cc? +1 from me. How large is the chance that there is still an affected browser

Re: NTLM authentication broken for Mozilla/3.0 User-Agents

2011-01-12 Thread Henrik Nordström
ons 2011-01-12 klockan 12:57 +1300 skrev Amos Jeffries: > There are two cases here, the Netscape one, yes is close to none. > However as you pointed out there are download agents using Mozilla/3.0. > How certain are we that the second hack case for that agent string is > not aimed at a popular

Re: NTLM authentication broken for Mozilla/3.0 User-Agents

2011-01-11 Thread Amos Jeffries
On 12/01/11 12:14, Henrik Nordström wrote: tis 2011-01-11 klockan 11:37 +0100 skrev Fabian Hugelshofer: What do you think about removing the special handling for Mozilla/3 and Netscape/3 agents from HttpMsg.cc? +1 from me. How large is the chance that there is still an affected browser in u

Re: NTLM authentication broken for Mozilla/3.0 User-Agents

2011-01-11 Thread Henrik Nordström
tis 2011-01-11 klockan 11:37 +0100 skrev Fabian Hugelshofer: > What do you think about removing the special handling for Mozilla/3 and > Netscape/3 agents from HttpMsg.cc? +1 from me. > How large is the chance that there is still an affected browser in use? Pretty close to none. And if there

NTLM authentication broken for Mozilla/3.0 User-Agents

2011-01-11 Thread Fabian Hugelshofer
a software upgrade tool (http://www.kcsoftwares.com/index.php?sumo) that uses "Mozilla/3.0 (compatible)" as User-Agent string. According to www.user-agents.com this string is used by some download managers. The problem occurs in an environment that uses NTLM authentication. The upgrade tool sup

HTTP Digest authentication support in Squid

2010-07-12 Thread Chitresh Kakwani
deals with the parent proxy's authorization and provides authorization free access to programs on my machine. But the local proxy sends HTTP Basic authentication header in HTTP requests if the following configuration directive is used : cache_peer 192.168.10.1 parent 8080 0 no-query

Re: Authentication based on ip address

2010-05-03 Thread Henrik Nordström
mån 2010-05-03 klockan 15:58 +0100 skrev Michael Graham: > My current feeling is that I will need to send the IP address to the > helpers. This would mean putting the IP address into the > AuthUserRequest and then adding a configuration option to the send the > address. My preference would be to

Authentication based on ip address

2010-05-03 Thread Michael Graham
Hi all, I'm interested in being able to authenticate to different LDAP servers or to only allow transparent authentication from some IP addresses. I've had a brief look at the wiki[1] but it doesn't seem to work correctly with NTLM authentication. My current feeling is that I wi

Re: [squid-users] Squid ftp authentication popup

2009-10-06 Thread Amos Jeffries
On Wed, 07 Oct 2009 02:48:37 +0200, Henrik Nordstrom wrote: > ons 2009-10-07 klockan 13:09 +1300 skrev Amos Jeffries: > >> 3.0 uses a generic fail() mechanism to send results back. That mechanism >> seems not to add the Proxy-Auth reply header at all. 3.0 also was only >> parsing the URL and conf

Re: [squid-users] Squid ftp authentication popup

2009-10-06 Thread Henrik Nordstrom
ons 2009-10-07 klockan 13:09 +1300 skrev Amos Jeffries: > 3.0 uses a generic fail() mechanism to send results back. That mechanism > seems not to add the Proxy-Auth reply header at all. 3.0 also was only > parsing the URL and config file. Popup re-sends contain the auth in headers > not URL. Stra

Re: [squid-users] Squid ftp authentication popup

2009-10-06 Thread Amos Jeffries
On Tue, 06 Oct 2009 23:25:35 +0200, Henrik Nordstrom wrote: > ons 2009-10-07 klockan 10:06 +1300 skrev Amos Jeffries: > >> Firefox-3.x wil happyily popup the ftp:// auth dialog if the proxy-auth >> header is sent. >> There were a few bugs which got fixed in the 3.1 re-writes and made squid >> sta

Re: [squid-users] Squid ftp authentication popup

2009-10-06 Thread Henrik Nordstrom
ons 2009-10-07 klockan 10:06 +1300 skrev Amos Jeffries: > Firefox-3.x wil happyily popup the ftp:// auth dialog if the proxy-auth > header is sent. > There were a few bugs which got fixed in the 3.1 re-writes and made squid > start to send it properly. It's broken in 3.0, not sure if its the same

Re: [squid-users] Re: squid 2.7 - problems with kerberos authentication

2009-09-02 Thread Markus Moeller
Subject: Re: [squid-users] Re: squid 2.7 - problems with kerberos authentication 2 сентября 2009 г. 14:32 пользователь Дмитрий Нестеркин (undelb...@gmail.com) написал: external_acl_type ldap_check ttl=1200 %LOGIN /usr/lib/squid/squid_ldap_group -R -b "dc=mydomain,dc=local" -f "(&a

Re: /bzr/squid3/trunk/ r9933: Fully transparent PASSTHRU option for authentication to peers.

2009-08-26 Thread Amos Jeffries
Note to the list: after discussion on IRC things have changed. Amos -- Please be using Current Stable Squid 2.7.STABLE6 or 3.0.STABLE18 Current Beta Squid 3.1.0.13

Re: /bzr/squid3/trunk/ r9933: Fully transparent PASSTHRU option for authentication to peers.

2009-08-26 Thread Henrik Nordstrom
ve with real pass-thru. They only syntesise if there is nothing to pass-thru. > The fact that the first two were abusable as pass-thru and PASS in > particular in too many guides used as semantic transparent pass-thru is > a problem. How so? > > PASS -> WWW+Proxy authen

Re: /bzr/squid3/trunk/ r9933: Fully transparent PASSTHRU option for authentication to peers.

2009-08-25 Thread Amos Jeffries
transparency The fact that the first two were abusable as pass-thru and PASS in particular in too many guides used as semantic transparent pass-thru is a problem. PASS -> WWW+Proxy authentication passed along as-is if present. external_acl auth added as basic Proxy-Auth if none present. Idea

Re: /bzr/squid3/trunk/ r9933: Fully transparent PASSTHRU option for authentication to peers.

2009-08-25 Thread Henrik Nordstrom
>From what I can tell the difference between the PASSTHRU and PASS is only that PASSTHRU do not add any injected credentials from external_acl, right? Imho there is no need for more than two of these options. PASS -> WWW+Proxy authentication passed along as-is if present. external_ac

Re: NTLM authentication popups, etc

2009-06-16 Thread Robert Collins
count of how many concurrent transactions are going on on that helper). I may be wrong. Regardless, you *must* queue to the same helper though. A trace of 84,9 29,9 may help. > The other two possibilities I can immediately think of: > > * 1 - authentication is aborted somewhere for whatever r

NTLM authentication popups, etc

2009-06-16 Thread Adrian Chadd
's a disconnect between the authentication state of the client -and- the authentication state of ntlm_auth. I'm trying to eliminate the possibilities here. The stateful helper stuff seems correct enough, so requests aren't being queued to already busy stateful helpers. The

Re: configure for authentication helper

2008-09-14 Thread Markus Moeller
Do I understand right that in squid-2 you don't support it ? Markus "Henrik Nordstrom" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] On sön, 2008-09-14 at 12:00 +0100, Markus Moeller wrote: My squid_kerb_auth helper would benefit from a better Makefile. To do that I created co

Re: SSL authentication.

2008-02-24 Thread Henrik Nordström
fre 2008-01-25 klockan 08:42 +0200 skrev Razard: > Question about basic user authentication on proxy. > > If user get http web page first times, the proxy respond to > authenticate them unsecure as default, so what described on login > windows on browser. But if user get http

SSL authentication.

2008-02-24 Thread Razard
Hi! Question about basic user authentication on proxy. If user get http web page first times, the proxy respond to authenticate them unsecure as default, so what described on login windows on browser. But if user get https page, browser creates SSL connection and no warnings about plain text

external_acl_type requests authentication

2008-01-21 Thread ian j hart
http://www.squid-cache.org/mail-archive/squid-users/200801/0364.html Okay, this version might even work. Once I realised i had to reimplement the original patch it was easy. There I go, tempting fate again. http://www.squid-cache.org/bugs/show_bug.cgi?id=1278 Caveats. I don't know all the code

Re: Squid authentication to upstreamISAserverwithNegotiate/Kerberos

2007-07-22 Thread Markus Moeller
Thanks. I have now a patch for STABLE13 which you can get from http://squidkerbauth.cvs.sourceforge.net/*checkout*/squidkerbauth/squid_kerb_proxy_auth/squid-2.6.STABLE13-kerb.patch?revision=1.2 and http://squidkerbauth.cvs.sourceforge.net/*checkout*/squidkerbauth/squid_kerb_proxy_auth/squid_ker

Re: Squid authentication to upstream ISAserverwithNegotiate/Kerberos

2007-07-22 Thread Henrik Nordstrom
On sön, 2007-07-22 at 14:44 +0100, Markus Moeller wrote: > I think I know why my patch doesn't work for CONNECT sites. The reason is > that request->host does NOT contain the next proxy as it is the case for the > GET method. Is there any other structure/varibale which contains the next > proxy

Re: Squid authentication to upstream ISAserverwithNegotiate/Kerberos

2007-07-22 Thread Markus Moeller
I had also a config error why Basic auth didn't work. I can now use Basic auth through the isa server for CONNECT. Markus "Markus Moeller" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] >I did some further investigation and it seems the ISA server reacts >differently for CONNECT a

Re: Squid authentication to upstream ISAserverwithNegotiate/Kerberos

2007-07-22 Thread Markus Moeller
I think I know why my patch doesn't work for CONNECT sites. The reason is that request->host does NOT contain the next proxy as it is the case for the GET method. Is there any other structure/varibale which contains the next proxy for all methods ? Thanks Markus "Markus Moeller" <[EMAIL PROT

Re: Squid authentication to upstream ISAserverwithNegotiate/Kerberos

2007-07-08 Thread Markus Moeller
I did some further investigation and it seems the ISA server reacts differently for CONNECT and GET. I tried both Basic and Negotiate with the existing squid way of doing it (not waiting for a 407, but immediatly send a Proxy Authorization) and in both cases it works fine for HTTP GET and fails

Re: Squid authentication to upstream ISAserverwithNegotiate/Kerberos

2007-07-03 Thread Markus Moeller
Find attached a patch which adds a call to my functions to http.c and a tar file with my routines. To make it work do the following: 1) Patch 2.6.STABLE13 with my patch file and extract my source to squid's src directory. 2) Run configure with CFLAGS="-I/usr/kerberos/include" LDFLAGS="-L/usr/ke

Re: Squid authentication to upstream ISA serverwithNegotiate/Kerberos

2007-07-03 Thread Henrik Nordstrom
On tis, 2007-07-03 at 21:19 +0100, Markus Moeller wrote: > I am now looking at http.c ( squid 2.6STABLE13) and I think I can add some > code around here: > > } else { > httpHeaderPutStrf(hdr_out, HDR_PROXY_AUTHORIZATION, "Basic %s", > base64_encode(orig_request

Re: Squid authentication to upstream ISA serverwithNegotiate/Kerberos

2007-07-03 Thread Markus Moeller
I have now a test version working (with hardcoded cache_peer hostname). So basically seems to work as Basic auth without looking at the 407 return code. Markus "Markus Moeller" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] >I am now looking at http.c ( squid 2.6STABLE13) and I t

Re: Squid authentication to upstream ISA serverwithNegotiate/Kerberos

2007-07-03 Thread Markus Moeller
I am now looking at http.c ( squid 2.6STABLE13) and I think I can add some code around here: } else { httpHeaderPutStrf(hdr_out, HDR_PROXY_AUTHORIZATION, "Basic %s", base64_encode(orig_request->peer_login)); } The only value I need at that point is the

Re: Squid authentication to upstream ISA server withNegotiate/Kerberos

2007-07-02 Thread Henrik Nordstrom
On Sun, 2007-07-01 at 13:31 +0100, Markus Moeller wrote: > How do you to it then with Basic authentication ? I thought that is > implemented or don't you wait either on a 407 ? We don't wait for the 407.. just blindly add the header on the assumption that if it's config

Re: Squid authentication to upstream ISA server withNegotiate/Kerberos

2007-07-01 Thread Markus Moeller
How do you to it then with Basic authentication ? I thought that is implemented or don't you wait either on a 407 ? Thank you Markus "Henrik Nordstrom" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]

Re: Squid authentication to upstream ISA server with Negotiate/Kerberos

2007-07-01 Thread Henrik Nordstrom
On Sat, 2007-06-30 at 23:53 +0100, Markus Moeller wrote: > I'd like to implement a way that squid authenticates to an upstream ISA > proxy server. The ISA server will request a Proxy-Authenticate: Negotiate > and I have a routine which can create the Kerberos token for the > Proxy-Authorize: Ne

Squid authentication to upstream ISA server with Negotiate/Kerberos

2007-06-30 Thread Markus Moeller
I'd like to implement a way that squid authenticates to an upstream ISA proxy server. The ISA server will request a Proxy-Authenticate: Negotiate and I have a routine which can create the Kerberos token for the Proxy-Authorize: Negotiate response, but I am not sure where I need to add the code

RE: Squid + ldap +ssl Secure authentication

2007-06-19 Thread Vootla, Bhagwan
enrik Nordstrom [mailto:[EMAIL PROTECTED] Sent: Friday, June 15, 2007 3:36 PM To: Vootla, Bhagwan Cc: [EMAIL PROTECTED]; squid-dev@squid-cache.org Subject: RE: Squid + ldap +ssl Secure authentication fre 2007-06-15 klockan 12:42 -0400 skrev Vootla, Bhagwan: > Using -Z option still returns me "C

RE: Squid + ldap +ssl Secure authentication

2007-06-15 Thread Henrik Nordstrom
fre 2007-06-15 klockan 12:42 -0400 skrev Vootla, Bhagwan: > Using -Z option still returns me "Could not Activate TLS connection" > I also tried with -p 636, which does not return me anything . Somehow I > need to implement this to meet the deadline (tomorrow). -Z is LDAPv3 STARTTLS on the norm

RE: Squid + ldap +ssl Secure authentication

2007-06-15 Thread Vootla, Bhagwan
AIL PROTECTED]; squid-dev@squid-cache.org Subject: Re: Squid + ldap +ssl Secure authentication tor 2007-06-14 klockan 07:47 -0400 skrev Vootla, Bhagwan: > 1)I have read that SSL encryption can be achieved from proxy > server to ldap server only. How can I achieve from browser to proxy > s

Re: Squid + ldap +ssl Secure authentication

2007-06-14 Thread Henrik Nordstrom
tor 2007-06-14 klockan 07:47 -0400 skrev Vootla, Bhagwan: > 1)I have read that SSL encryption can be achieved from proxy > server to ldap server only. How can I achieve from browser to proxy > server ? Squid has all the support that is needed on the proxy side of things for this, by using the

Squid + ldap +ssl Secure authentication

2007-06-14 Thread Vootla, Bhagwan
Greetings ! I configured Squid+LDAP which works fine, but passwords are sent in plain text format over LAN. I need to send the passwords over SSL. In this regard, I have two questions. 1) I have read that SSL encryption can be achieved from proxy server to ldap server only. How can I achi

Re: Authentication: Time and Monetary contributions

2007-05-11 Thread Henrik Nordstrom
fre 2007-05-11 klockan 14:12 -0500 skrev Stefan Adams: > I've been pondering... > > Surely this technique does not work with users in a ThinClient > environment? ThinClients are quickly growing in popularity. How > could this technique be improved to support Linux PCs which merely act > as dumb

Re: Authentication: Time and Monetary contributions

2007-05-11 Thread Stefan Adams
I've been pondering... Surely this technique does not work with users in a ThinClient environment? ThinClients are quickly growing in popularity. How could this technique be improved to support Linux PCs which merely act as dumb terminals that open a Remote Desktop Connection to a single Window

Re: Authentication: Time and Monetary contributions

2007-05-10 Thread Henrik Nordstrom
ons 2007-05-09 klockan 13:43 -0500 skrev Stefan Adams: > On 5/9/07, Henrik Nordstrom <[EMAIL PROTECTED]> wrote: > > Sure. Been on the devel.squid-cache.org since promised.. > > > > http://devel.squid-cache.org/projects.html#ntlm_ip_cache > > Bah! I did end up finding it -- THANKS!! I had used yo

Re: Authentication: Time and Monetary contributions

2007-05-09 Thread Stefan Adams
On 5/9/07, Henrik Nordstrom <[EMAIL PROTECTED]> wrote: Sure. Been on the devel.squid-cache.org since promised.. http://devel.squid-cache.org/projects.html#ntlm_ip_cache Bah! I did end up finding it -- THANKS!! I had used your direct link also provided in the message (http://devel.squid-cache

Re: Authentication: Time and Monetary contributions

2007-05-09 Thread Henrik Nordstrom
ons 2007-05-09 klockan 13:29 -0500 skrev Stefan Adams: > Henrik, thanks for your great response! I have a question below... > > On 4/2/07, Henrik Nordstrom <[EMAIL PROTECTED]> wrote: > > > off frequently. When the cache is expired or empty, authentication > >

Re: Authentication: Time and Monetary contributions

2007-05-09 Thread Henrik Nordstrom
ons 2007-05-09 klockan 13:20 -0500 skrev Stefan Adams: > 1) IP-based timed session. Authentication is actually done via a web > page and not using the browser's built-in authentication schemes. > This provides a lot of flexibility. Once the user enters credentials > into t

Re: Authentication: Time and Monetary contributions

2007-05-09 Thread Stefan Adams
enter squid in with commercial players like Barracuda. There are two ways that authentication works with the Barracuda: 1) IP-based timed session. Authentication is actually done via a web page and not using the browser's built-in authentication schemes. This provides a lot of flexibility. Onc

Re: Authentication: Time and Monetary contributions

2007-04-02 Thread Henrik Nordstrom
lör 2007-03-31 klockan 12:27 -0500 skrev Stefan Adams: > 1) I understand that a browser asks a user for authentication because > the proxy server instructs the browser that it needs credentials. My > idea is to provide a server-side caching option within squid that > would only ask

Re: Authentication: Time and Monetary contributions

2007-04-02 Thread Adrian Chadd
On Sat, Mar 31, 2007, Stefan Adams wrote: > Hello squid developers! > > I have been devoting a lot of time to authentication within the proxy. > However, every solution I provide to my customers is unacceptable. > They simply get prompted too often or something doesn't wo

Authentication: Time and Monetary contributions

2007-04-02 Thread Stefan Adams
Hello squid developers! I have been devoting a lot of time to authentication within the proxy. However, every solution I provide to my customers is unacceptable. They simply get prompted too often or something doesn't work at all. Using NTLM, certain sites, e.g. links to videos on cn

Re: AD (LDAP) authentication helper

2007-03-25 Thread Henrik Nordstrom
fre 2007-03-23 klockan 17:13 -0400 skrev Edmundo Carmona: > If you are interested in the helper, let me know, so I can send it > (once I make it during the next days) for your consideration so it > becomes a part of squid by deault. Sure. You are most welcome to submit alternative authe

AD (LDAP) authentication helper

2007-03-25 Thread Edmundo Carmona
Hi! Some months ago I made a helper (with php) that authenticates users against ActiveDirectory using LDAP. I had used ntlm_auth before, but after switching Domain Controllers, I wasn't able to make it work again (because of trust problems), so I decided to skip all the kerberos/samba/winbind/ntl

Re: TCP_DENIED logging as part of HTTP authentication

2006-12-13 Thread Henrik Nordstrom
log codes.. authentication is the most obvious, but there is significant collisions in other aspects as well. We have held back on the log codes in fear of breaking log parsers, but now with the custom log formats we are free to invent again without the same level of fear. To solve this I suggest introducing

Re: TCP_DENIED logging as part of HTTP authentication

2006-12-13 Thread Jeremy Hall
oh I WHOLE_HEARTEDLY agree! the logs are filled with duplicate requests because of this _J >>> Adrian Chadd <[EMAIL PROTECTED]> 12/12/06 11:22 PM >>> Hiya, I've had a few customers ask me why there's "TCP_DENIED"s in the logfiles and I've tried

TCP_DENIED logging as part of HTTP authentication

2006-12-12 Thread Adrian Chadd
Hiya, I've had a few customers ask me why there's "TCP_DENIED"s in the logfiles and I've tried to explain that its part of the NT authentication process. What would be nice is if we could log a bunch of different TCP_DENIEDs, covering for example: * "no supplied

Re: authentication and origin servers

2006-11-24 Thread Henrik Nordstrom
fre 2006-11-24 klockan 09:12 -0500 skrev Jeremy Hall: > If I have configured authentication for both ntlm and basic so that > legacy browsers that do not support ntlm may use my proxy, how then do I > allow these users to connect to a site that uses basic authentication > for their

authentication and origin servers

2006-11-24 Thread Jeremy Hall
Hello, If I have configured authentication for both ntlm and basic so that legacy browsers that do not support ntlm may use my proxy, how then do I allow these users to connect to a site that uses basic authentication for their own purposes? For example I can't log into cisco.com unl

  1   2   >