I am using the latest 3.4 build and a config that looks like:

ident_lookup_access allow localnet
ident_lookup_access deny all
ident_timeout 5 seconds

acl password_required proxy_auth REQUIRED
acl ident_required ident REQUIRED

http_access allow localnet ident_required ident_unrestricted_group
http_access allow localnet ident_required unrestricted_sites
http_access_deny localnet ident_required

http_access allow localnet password_required password_unrestricted_group
http_access allow localnet password_required unrestricted_sites

http_access_deny

The idea is that ident will be used, and if ident can't be used, proxy auth 
(ntlm) will be used.

The problem is that for users who ident successfully but are not in the 
ident_unrestricted_group / password_unrestricted_group (both the same windows 
group), they get a 407 response and a password prompt, instead of an access 
denied. I can work around this by putting:

deny_info 403:ERR_ACCESS_DENIED ident_required

just before the identd deny, but it seems like a hack.

Am I doing something wrong or could this be a bug?

Also, are there any implementations of ident that are a bit more useful? Such a 
thing would:
. have a single TCP connection between squid and the client (preferably client 
initiated), kept alive for a reasonable time
. authenticate the identd server itself (identd is not really considered secure)
. allow squid to specify all aspects of the connection (ident expects the 
lookup to come from the destination, which isn't true if you are doing 
transparent proxying, although easy to patch squid to fake the source)

Thanks

James

Reply via email to