The problem lies more in the way how Kerberos proxy authentication works. The client uses the proxy name to create a ticket and in this case it would be the name of the first proxy e.g. proxy1.internal. The first proxy will pass it through to the authenticating proxy for authentication proxy2.internal. Now the client receiving a 407 thinks that proxy1 asked for authentication (not knowing it is only a passthrough) and will ask for a ticket for proxy1, which it can't get as proxy1 is not in AD. Even if proxy1 would be in AD, the client would send a proxy1 ticket to proxy2 which will be rejected.

Markus





"Amos Jeffries" wrote in message news:ac36f75f-97c7-211e-a5bd-b12b7035a...@treenet.co.nz...

On 12/10/21 9:33 pm, 森 隆聡 wrote:
I made Single Sign On environment with AD+Squid and it worked fine.

[It works]
Client(Windows) -> Squid(CentOS) -> Internet

* Client is joined the domain and Squid configured Kerberos Authentication with AD.

But after add another squid, it didn't work.

...

Do I misundastand something or squid originally don't support
multiple proxy those relay Kerberos authentication information?


login=PASSTHRU means your Squid plays no part in the authentication. It
literally passes the peer the same Proxy-Auth* headers it receives from
the client, and the resulting response ones go back to the client.
 Which means auth issues are a problem with either the client or server
software. Squid cannot do anything about those.


Amos
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to