Yes, I built squid myself. i downloaded the files from the squid site
and installed it.
Are you asking me rebuild squid using these options --enable-auth
--enable-{auth type}-auth-helpers={helper names}
Ok, let me try this and get back if necessary.
Thanks so much for your time.
Avinash
O
Grin King wrote:
Hi guys,
I've been reading up on this stuff for over a week now, trying to work
out where i've gone wrong, but can't see anything, so am reaching out
to you with the hope someone else has gone through the pain of this
and can point me in the right direction :)
I am currently ru
Hi guys,
I've been reading up on this stuff for over a week now, trying to work
out where i've gone wrong, but can't see anything, so am reaching out
to you with the hope someone else has gone through the pain of this
and can point me in the right direction :)
I am currently running SquidNT 2.7 s
> I have Squid Version 2.5.STABLE14 running on Red Hat Enterprise Linux AS
> release 4 as a basic caching web proxy with a couple filters. It's being
> used for student computer labs so that the students cannot access MySpace
> or Facebook from the labs (and to provide caching, of course).
>
> When
On fre, 2008-10-10 at 00:19 +0200, Dalibor Dukic wrote:
> I have transparent SQUID proxy with L2/L3 switch redirecting HTTP
> traffic to proxy through GRE tunnel. Yesterday, I've noticed that SQUID
> box is sending strange packets (TCP RST) to destination web server in
> order to terminate connect
> Hi,
>
> I have transparent SQUID proxy with L2/L3 switch redirecting HTTP
> traffic to proxy through GRE tunnel. Yesterday, I've noticed that SQUID
> box is sending strange packets (TCP RST) to destination web server in
> order to terminate connection. The problem is because these packets have
>
Amos Jeffries wrote:
Chris Robertson wrote:
Omer Khalid wrote:
Hi,
I am trying to configure squid 2.6 on my server with the following
configure options:
[EMAIL PROTECTED] ./configure
Good so far, but...
--prefix=%(prefix)s
That's a problem. "%(prefix)s" is not a valid path. It looks
Hi,
I have transparent SQUID proxy with L2/L3 switch redirecting HTTP
traffic to proxy through GRE tunnel. Yesterday, I've noticed that SQUID
box is sending strange packets (TCP RST) to destination web server in
order to terminate connection. The problem is because these packets have
source addres
I have Squid Version 2.5.STABLE14 running on Red Hat Enterprise Linux AS
release 4 as a basic caching web proxy with a couple filters. It's being used
for student computer labs so that the students cannot access MySpace or
Facebook from the labs (and to provide caching, of course).
When multipl
File a bug report.
Regards
Henrik
On tor, 2008-10-09 at 18:36 +0200, Ivo Pedro Sandoval wrote:
> Hi,
>
> We have a strange problem with overlap in logs files. We have a squid 3
> with NTLM authentication. The problems is that sometime we detect that a
> mistake in the username of logs files. USE
On Thu, 2008-10-09 at 08:53 -0700, Puze Yang wrote:
> Please bear with me as I am new to the proxy server filed and my question
> must be a basic one.
> For re-branding purpose, in a intranet environment, a HTTPS requests from
> Client browser is
> sent to the Proxy Server, and the Proxy Server
Hi,
We have a strange problem with overlap in logs files. We have a squid 3
with NTLM authentication. The problems is that sometime we detect that a
mistake in the username of logs files. USER1 have the IP 192.168.4.49
and the USER2 have the 192.168.3.26. The first lines are normal and we
detect
Hi there,
Please bear with me as I am new to the proxy server filed and my question must
be a basic one. For re-branding purpose, in a
intranet environment, a HTTPS requests from Client browser is sent to the Proxy
Server, and the Proxy Server in turn request a HTTPS page
from an internal Web S
Chris Robertson wrote:
Omer Khalid wrote:
Hi,
I am trying to configure squid 2.6 on my server with the following
configure options:
[EMAIL PROTECTED] ./configure
Good so far, but...
--prefix=%(prefix)s
That's a problem. "%(prefix)s" is not a valid path. It looks like a
variable that
On tor, 2008-10-09 at 10:09 +0200, Gregory Machin wrote:
> Hi
> what cause this
Most likely a broken dyndns client configured to use the proxy, combined
with the same port being used both for forward proxy and transparent
interception.
> 2008/10/05 05:27:47| WARNING: Forwarding loop detected for
Hi
what cause this
2008/10/05 05:27:47| WARNING: Forwarding loop detected for:
GET
/nic/update?&hostname=za1fwl01.dnsalias.com&myip=196.22.217.98&wildcard=NOCHG&mx=NOCHG&backmx=NOCHG
HTTP/1.0
Authorization: Basic c3ludGhlc2V1OmRvd251bmRlcg==
User-Agent: Fortinet_DDNSC/1.200310271130
Host: 66.*.*.
On 07.10.08 20:34, Henrik Nordstrom wrote:
> On tis, 2008-10-07 at 12:46 -0300, Rafael Gomes wrote:
> > So, it is very risky.
> >
> > User may get a old page after a crash and journal recovery.
>
> It's worse. The user may get a corruoted page with content mixed from
> various old files after a s
17 matches
Mail list logo