On 09/06/11 23:11, kkk kkk wrote:
Hi everyone,

I'm running Squid 3.1 in Interception mode that is set to intercept
traffic to a list of 10 websites.
One security concern I have is that anyone in my ACL can enter my
proxy IP and port in their browser and use it as a regular proxy.

Is there a way to disable this access? If I can disable this access,

You fail to say which NAT infrastructure is being used to intercept.

The Linux intercept examples have been updated to include rules in the "mangle" netfilter table which provide this protection.
  http://wiki.squid-cache.org/ConfigExamples/Intercept/LinuxDnat
  http://wiki.squid-cache.org/ConfigExamples/Intercept/LinuxRedirect

If you are using some other form of NAT, nobody has (yet) provided any extra details about solving this problem.

no one can abuse my service because I can control what dstDomains will
use my proxy.

Your configuration displays that this claim is probably false. see below.


This is my current setup:

acl allowed_IP src IP
http_access allow allowed_IP

Anyone in the allowed_IP list can do anything they like regardless of domain.

http_access deny all


Only Domains want to allow access:
acl allowed_domains dstdomain


If it's not theoretical possible, how can I write an ACL combo that
only allow "allowed_ip" to access "allowed_domains" instead of
accessing everything once it's allowed?

Access controls in Squid are complete boolean logic language. Anything that can be described in if-else form can be configured.
  http://wiki.squid-cache.org/SquidFaq/SquidAcl#Common_Mistakes

Amos
--
Please be using
  Current Stable Squid 2.7.STABLE9 or 3.1.12
  Beta testers wanted for 3.2.0.8 and 3.1.12.2

Reply via email to