zulkarnain wrote:
Hi,
I would like to delete the cache hits/object that
larger than 128MB which is inside on the cache dir. I
would like to know the safety way to do this manualy.
The safetst method is to use the purge tool (some slight modifications
might be needed).
The quickest method
Robert Collins wrote:
Requests without authentication are redirected to the policy page, with
the original page in a cookie/form submission. The policy page sets a
cookie POLICY ACCEPTED when the user accepts the policy. The policy
web server *must* be accessed via squid.
When a request to
Hi Jack
For group ldap
1) Find the ldapsearch command to give a true condition for your AD
groups i.e. the -f condition for squid_ldap_group
For AD most probably
((cn=%a)(member=uid=%v,*)(objectclass=group))
2)create acls criteria for each group
acl group1 external ldapou group_in_ad_1
acl
Is it possible to redirect the requests of a intranet clients's passing
through the proxy in the direction of the internet by a multiples antivirus
servers ?
The cache_peer have a round robin option , is it usable to do this ?
Thank for any clue
--
Guilhem michel Administrateur proxy
I'm running Squid 2.5 Stable4 on Linux Mandrake 8.2
Squid_auth_ldap helper to authenticate users coming into our network
through our gateway
I have to authenticate users that come from our gateway only (others don't
need to autheticate)
And I have to set different Internet access level for
--- Henrik Nordstrom [EMAIL PROTECTED] wrote:
zulkarnain wrote:
Hi,
I would like to delete the cache hits/object that
larger than 128MB which is inside on the cache
dir. I
would like to know the safety way to do this
manualy.
The safetst method is to use the purge tool (some
Bilal wrote:
Hi,
I would like to know how Squid handles a socket connection with a user
after the connection has been established. I'm assuming that Squid uses
the same socket to handle the requests and responses to all the objects
that make up a web page. For example, if a user requests
yes.
tor 2003-02-06 klockan 12.20 skrev GUILHEM Michel (34):
Is it possible to redirect the requests of a intranet clients's passing
through the proxy in the direction of the internet by a multiples antivirus
servers ?
The cache_peer have a round robin option , is it usable to do this ?
Squid uses the HTTP protocol over TCP, as specified in RFC2616 and it's
predecessors.
Connections browser-squid and squid-servers is managed separately.
tor 2003-02-06 klockan 11.21 skrev Bilal:
Hi,
I would like to know how Squid handles a socket connection with a user
after the connection
Veryfy your http_access rules. Keep in mind that it is a ordered list of
rules. The first http_access rule where all listed acls evaluate to true
determines if the request is to be allowed or denied.
Regards
Henrik
tor 2003-02-06 klockan 14.11 skrev Yannick MASSE/INFO/FR/DELMAS:
I want to
Thanks for your help.
I just forgot tu write a rule between user in MyNetwork and users to be
authenticated. Here is my squid.conf that work now :)
#
acl MyNetwork src 172.16.10.1-172.16.10.255
acl GoodSites dstdomain .google.com .yahoo.com ...
-- [ From: NetSys Administration * EMC.Ver #2.5.02 ] --
Hello from Honduras
Can anyone explain why all my hits seem to be finished with NONE
66.178.50.114 - - [06/Feb/2003:08:01:02 -0600] GET http://www.uol.com.
br/photos/ed13/assinaturas/materia-centro.htm HTTP/1.1 200 8268 TCP_MEM_HIT
:NONE
Have been lurking and watching, but do not find much info on cache size =
recommendations and trade-off in speed. Would like, of course to have =
the largest cache known to man. :)
Machine is 2gz and can put in as much ram as we need.
So if I've 40 or 60 gigs to give squid, will I slow it down
Rodney Richison wrote:
Have been lurking and watching, but do not find much info on cache size =
recommendations and trade-off in speed. Would like, of course to have =
the largest cache known to man. :)
Machine is 2gz and can put in as much ram as we need.
So if I've 40 or 60 gigs
Hello List,
I only want to have squid authenticate users via winbind against the AD
of the PDC.
After reading the squid faq and the manpage for winbind,
I have (at the moment) only one question left:
I have successfully created a smb.conf to let winbind authenticate
against the Active Directory
Marc Elsen wrote:
How does Squid know that all the objects have been requested and that
the socket should be closed? What determines this?
It doesn't ,the browser (or client) will tell squid when it is
finished
asking for objects.
Squid will close the connection if the browser does
For Squid use you can completely ignore all winbind documentation
speaking about PAM or NSS. Squid talks directly to winbind, not via PAM
or NSS. In fact you can even compile winbind with both PAM and NSS
disabled when only used by Squid.
If you want to use winbind for UNIX account integration,
As long as you stay within the ram usage limitations (see the Suqid FAQ
for ram vs cache sizing) the size of your cache has marginal impact on
performance, except that hit ratio increases somewhat with larger
caches.
As for cache sizing: Having a cache much bigger than 1 weeks of traffic
is not
Henrik Nordstrom [EMAIL PROTECTED]
Sent by: [EMAIL PROTECTED]
02/05/2003 01:11 AM
To: Jack [EMAIL PROTECTED]
cc: Squid Users [EMAIL PROTECTED]
Subject:Re: [squid-users] squid proxy for W2K active directoty users
Jack wrote:
Is it possible to use W2K
On Thu, 2003-02-06 at 22:05, Neil Marjoram wrote:
I am hoping someone can help me with 3 problems I am having deploying
Squid.
I have a very restricive brief from management about how this should
work, and a large quote from some company to make it work - which we can
not afford as a
Yes, I got the purge tool now :)
what modification I should made ?
Best regards,
zulkarnain
--- Henrik Nordstrom [EMAIL PROTECTED] wrote:
tor 2003-02-06 klockan 12.09 skrev zulkarnain:
where I can get the purge tool and what
modification
that I should made?
Have you tried the to look
From: Robert Collins [mailto:[EMAIL PROTECTED]]
Definately not.
---
:-)
Well, first thoughts:
1) if you want to redirect everything coming to from squid,
use network
layer interception. It exists, and works. It has issues - but no more
than 100% alteration via squid itself.
22 matches
Mail list logo