On 10/25/22 2:43 AM, Matus UHLAR - fantomas wrote:
These are the FTP protocol "hacks" I mentioned before.
FYI RFC 1919: Classical verses Transparent IP Proxies § 4.1 --
Transparent proxy connection example -- describes the operation of an
intercepting / (network) transparent FTP proxy that do
On 10/25/22 1:09 PM, Grant Taylor wrote:
It seems as if "transparent" in the context of proxies is as ambiguous
as "secure" in the context of VPNs.
The former can be "data transparent" and / or "network transparent". The
latter can be "privacy secure" and / or "integrity secure". }:-)
Oy ve
Hello,
Is there a way to use specific DNS servers based on the user or connecting
IP address that is making the connection by using acls or any other method?
If so, can someone send an example.
Thanks,
James
___
squid-users mailing list
squid-users@list
Hi all,
Thanks for the replies.
I have included the requested output from tcpdump below:
tcpdump -A -s 0 -ni enp4s0 "host 159.203.14.9 and (((ip[2:2] -
((ip[0]&0xf)<<2)) - ((tcp[12]&
0xf0)>>2)) != 0)"
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp4s0,
On 10/25/22 1:01 PM, Matus UHLAR - fantomas wrote:
sorry, this one is from 7230, section 2.3
Thank you for the reference.
If we don't use "data" and "network" in addition to "transparent",
result is ambiguous. "intercepting proxy" is not.
Agreed.
It seems as if "transparent" in the contex
On 10/25/22 12:57 PM, Matus UHLAR - fantomas wrote:
That is why I prefer using "intercepting proxy" for case where
connections between clients and servers intercepted by proxy, without it
being configured in browsers.
Fair enough.
precisely, so what exactly aren't you convinced about? :-)
On 10/25/22 10:18 AM, Matus UHLAR - fantomas wrote:
term "interception proxy" better defines what happens here:
Instead, an interception proxy filters or redirects outgoing TCP
port 80 packets (and occasionally other common port traffic).
On 25.10.22 12:52, Grant Taylor wrote:
Where did you p
On 10/25/22 11:03 AM, Matus UHLAR - fantomas wrote:
I think intercepting is better, more precise.
On 25.10.22 12:14, Grant Taylor wrote:
I think that Squid can be an interception proxy as it can filter /
alter content.
I also think that Squid (as an interception proxy) can be used
transpare
On 10/25/22 10:18 AM, Matus UHLAR - fantomas wrote:
term "interception proxy" better defines what happens here:
Instead, an interception proxy filters or redirects outgoing TCP port
80 packets (and occasionally other common port traffic).
Where did you pull that quote from? I don't see "inte
On 10/25/22 11:03 AM, Matus UHLAR - fantomas wrote:
I think intercepting is better, more precise.
I think that Squid can be an interception proxy as it can filter / alter
content.
I also think that Squid (as an interception proxy) can be used
transparently.
those two are completely separ
On 10/25/22 10:18 AM, Matus UHLAR - fantomas wrote:
I prefer to explicitly state what one means by transparent because
RFC2616 has defined transparent proxy diferently:
On 25.10.22 10:56, Grant Taylor wrote:
I do too. I /thought/ that I was explicitly stating. At least that
was my intention.
On 10/25/22 10:18 AM, Matus UHLAR - fantomas wrote:
I prefer to explicitly state what one means by transparent because
RFC2616 has defined transparent proxy diferently:
I do too. I /thought/ that I was explicitly stating. At least that was
my intention.
Aside: That's why I included my wor
Hello,
Here is the part of our squid.conf on Squid 5 :
...
acl my_cf1_list server_cert_fingerprint '/etc/squid5/CF1.txt'
ssl_bump peek all
ssl_bump terminate my_cf1_list
ssl_bump splice all
...
We're not sure about the ssl_bump keys and options to use here, to be honnest
we've already s
On 10/25/22 2:43 AM, Matus UHLAR - fantomas wrote:
if by "transparent" you mean "intercepting" proxy, that is incorrect
On 25.10.22 09:47, Grant Taylor wrote:
By "transparent" I mean using network techniques to force clients to
use a proxy that aren't themselves aware that they are using a pro
On 10/25/22 2:43 AM, Matus UHLAR - fantomas wrote:
if by "transparent" you mean "intercepting" proxy, that is incorrect
By "transparent" I mean using network techniques to force clients to use
a proxy that aren't themselves aware that they are using a proxy.
CONNECT is HTTP command designed
On 10/23/22 20:36, Matthew H wrote:
Hi,
I'm using Squid to proxy HTTP requests to another proxy. I can see squid
sending the request to the parent and getting a response, but it sends
the client that initiated the request a 502 Bad Gateway response.
On closer inspection it appears the parent
On 2022-10-24 13:36, Matthew H wrote:
Hi,
I'm using Squid to proxy HTTP requests to another proxy. I can see
squid
sending the request to the parent and getting a response, but it sends
the
client that initiated the request a 502 Bad Gateway response.
That is correct behaviour. Squid does n
I do not know exactly what you mean by "https proxy" in this context, but
I suspect that you are using the wrong FireFox setting. The easily
accessible "HTTPS proxy" setting in the "Configure Proxy Access to the
Internet" dialog is _not_ what you >need! That setting configures a
plain text HT
On 24.10.22 15:48, LEMRAZZEQ, Wadie wrote:
I think this discussion had diverged from its subject
So I refocus in our subject, gents
I do not know exactly what you mean by "https proxy" in this context, but
I suspect that you are using the wrong FireFox setting. The easily
accessible "HTTPS pr
On 10/21/22 2:25 AM, Matus UHLAR - fantomas wrote:
apparently this is a hack to be able to define proxy autoconfig in
the location field.
Since it has very restricted capabilities, it's apparently non-issue.
I guess that you can only define FindProxyForURL() this way.
On 21.10.22 11:25, Gran
20 matches
Mail list logo