[clug] Squid authentication issue.

Telek, John John_Telek at tesg5.com.au
Fri Mar 26 00:45:38 GMT 2004


I have looked at what is required and kerberos is nescescarry. I have
found some howtos and other docco. Also, our AD config demands kerberos.


Is there another way.

  John


-----Original Message-----
From: Andrew Smith [mailto:andrew at coolchilli.com] 
Sent: Friday, March 26, 2004 11:33 AM
To: Telek, John
Subject: Re: [clug] Squid authentication issue.


Nope, it's quite simple.  It has a shell script which you can run
manually to verify auth results (Squid uses a very simple std in/out
"username password" on one line, result "OK" or  "ERROR" on the next).

It was a while ago that I implemented it, and this was more appealing
than NTLM, from distant memory.

Andrew

----- Original Message ----- 
From: "Telek, John" <John_Telek at tesg5.com.au>
To: "Andrew Smith" <andrew at coolchilli.com>
Sent: Friday, March 26, 2004 11:25 AM
Subject: RE: [clug] Squid authentication issue.


> Does this require kerberos to work, cause I have an issue with that. 
> It's why I went ntlm.
>
>   John
>
> -----Original Message-----
> From: Andrew Smith [mailto:andrew at coolchilli.com]
> Sent: Friday, March 26, 2004 11:08 AM
> To: Telek, John; CLUG
> Subject: Re: [clug] Squid authentication issue.
>
>
> Hi John,
>
> I've been using smb_auth
> (http://www.hacom.nl/~richard/software/smb_auth.html) at customer 
> sites for years.  Works like a champ, except when the MS server's 
> system drive fills up :)
>
> Andrew
>
> ----- Original Message -----
> From: "Telek, John" <John_Telek at tesg5.com.au>
> To: "CLUG" <linux at samba.org>
> Sent: Friday, March 26, 2004 10:49 AM
> Subject: [clug] Squid authentication issue.
>
>
> > I have a squid proxy server that is configured for authentication 
> > using ntlm, but it is having an imapact on my network performance. 
> > Every http packet seems be being checked and is being checked 2 or 3

> > times before being let through.
> >
> > Is there a way to minimise this over head or is there another 
> > authenticaion method that we can use that does not rely on a local 
> > passwd or auth file on the proxy server.
> >
> > Version is Squid 2.5STABLE4.
> >
> > I can supply a copy of my config file if need be.
> >
> >   John
> >
> >
> > The information contained in this e-mail and any attachments to it:
> >
> > (a) may be confidential and if you are not the intended recipient, 
> > any
>
> > interference with, use, disclosure or copying of this material is 
> > unauthorised and prohibited. If you have received this e-mail in 
> > error, please delete it and notify the sender;
> >
> > (b) may contain personal information of the sender as defined under 
> > the Privacy Act 1988 (Cth).  Consent is hereby given to the
> > recipient(s) to collect, hold and use such information for any 
> > reasonable purpose in the ordinary course of TES' business, such as 
> > responding to this e-mail, or forwarding or disclosing it to a third

> > party.
> >
> >
>
>
>
> The information contained in this e-mail and any attachments to it:
>
> (a) may be confidential and if you are not the intended recipient, any

> interference with, use, disclosure or copying of this material is 
> unauthorised and prohibited. If you have received this e-mail in 
> error, please delete it and notify the sender;
>
> (b) may contain personal information of the sender as defined under 
> the Privacy Act 1988 (Cth).  Consent is hereby given to the 
> recipient(s) to collect, hold and use such information for any 
> reasonable purpose in the ordinary course of TES' business, such as 
> responding to this e-mail, or forwarding or disclosing it to a third 
> party.
>
>



The information contained in this e-mail and any attachments to it:

(a) may be confidential and if you are not the intended recipient, any
interference with, use, disclosure or copying of this material is
unauthorised and prohibited. If you have received this e-mail in error,
please delete it and notify the sender;

(b) may contain personal information of the sender as defined under the
Privacy Act 1988 (Cth).  Consent is hereby given to the recipient(s) to
collect, hold and use such information for any reasonable purpose in the
ordinary course of TES' business, such as responding to this e-mail, or
forwarding or disclosing it to a third party.


More information about the linux mailing list