Hi,

On Sat, 5 Nov 2005 20:40:02 -0800
Mark Knecht <[EMAIL PROTECTED]> wrote:

> > yes thats the point of squid it is a proxy.
> 
> OK, but that's like using the word in the definition to a guy who's
> never used a proxy. ;-)
> 
> I'm still unclear though, and I'm sure I'll find this out either
> through reading or use. do all packets for the machine using the proxy
> go through the proxy? Or is it more like a DNS server where just the
> URL's go through the proxy to figure out what to do?

No, it forwards all traffic. And there's another thing: You'd have to
configure it at the target computer. That is, one can deconfigure it...
but read below, there's an option...

> The I created a lot of extra wireless traffic, especially since the
> machine being observed seems to like to watch a lot of gaming videos.
> If it's just addresses, then no big deal. If it's the whole data
> stream then it's not going to work well.

Well, in order to log the traffic, you'll have to intercept it.

Probably, a text filtering firewall looking for --dport 80 and
"HTTP/1." at the start of the packet would suffice. You can even use a
firewall to make your proxy into a transparent proxy - i.e., all
traffic is intercepted at network level and redirected through the
proxy. This only works if the firewalling computer is at router level.

Maybe another idea would be to just sniff the WLAN in monitor mode and
use a packet filter to match TCP:80/"HTTP" packets.


-hwh
-- 
gentoo-user@gentoo.org mailing list

Reply via email to