On Tue, 17 Aug 2010 14:00:57 -0500, "Dean Weimer" <dwei...@orscheln.com>
wrote:
> I know when using squid as an intercept proxy it can't do authentication
> as the clients don't know it's there, but do any of you out there know
if
> you can use it with a parent proxy that requires authentication?
> 
> The specific scenario I am considering is Squid in DMZ with WCCPv2 used
in
> conjunction with a Cisco ASA 5520 firewall and an external (Websense
> filtering) proxy that requires authentication, both NTLM and basic
> authentication is supported.
> 
> Clients
>    |
> Cisco ASA5520 -WCCPv2- Squid 3.1.6 (In DMZ) -- Secondary Internet
> Connection -- Parent Proxy Service 
>    |
> Internet
> 
> We are currently using auto-detect, but continually keep running into
> applications that don't recognize auto-detect, or sometimes don't even
have
> the ability to read a configuration script.  I am trying to come up with
a
> way to alleviate the user's issues, without losing our local cache.  And
> keeping the HR and Legal departments happy by continuing to filter
websites
> with content that some could find offensive, as well as blocking unsafe
> (malware/spyware) websites.


1) IF the client thinks its talking to the parent proxy. cache_peer
login=PASS (or login=PASSTHRU) will pass on the credentials without
requiring auth within Squid.

2) IF Squid itself needs to login to the parent. cache_peer login= with
username:password will insert the given login to relayed requests.

NP: Older Squid only allow Basic auth protocol credentials to be added
this way. 3.2 brings the ability to do Negotiate/Kerberos as well. NTLM
remains a sticky problem.


This login= is only relevant once on a cache_peer entry. So its one or the
other can be used at once. #2 is probably better/simpler for you since the
clients are not involved in the auth process.


Hope this helps.

Amos

Reply via email to