Re: [squid-users] Long Group TAG in access.log when using kerberos

2024-01-31 Thread David Touzeau
Thank Alex This will fix the issue! Le 31/01/2024 à 17:43, Alex Rousskov a écrit : On 2024-01-31 09:23, David Touzeau wrote: Hi %note is used by our external_acls and for log other tokens And we use also Group as token. it can disabled by direcly removing source kerberos code before

Re: [squid-users] Long Group TAG in access.log when using kerberos

2024-01-31 Thread Alex Rousskov
On 2024-01-31 09:23, David Touzeau wrote: Hi %note is used by our external_acls and for log other tokens And we use also Group as token. it can disabled by direcly removing source kerberos code before compiling but i would like to know if there is another way In most cases, one does not have

Re: [squid-users] Long Group TAG in access.log when using kerberos

2024-01-31 Thread David Touzeau
Hi %note is used by our external_acls and for log other tokens And we use also Group as token. it can disabled by direcly removing source kerberos code before compiling but i would like to know if there is another way Le 31/01/2024 à 14:36, Andrey K a écrit : Hello, David, > Anyway to

Re: [squid-users] Long Group TAG in access.log when using kerberos

2024-01-31 Thread Andrey K
Hello, David, > Anyway to remove these entries from the log ? I think you should correct logformat directive in your squid configuration to disable annotations logging (%note): http://www.squid-cache.org/Doc/config/logformat/ Kind regards, Ankor. ср, 31 янв. 2024 г. в 15:51, David

Re: [squid-users] Long Group TAG in access.log when using kerberos

2024-01-31 Thread David Touzeau
Anyway to remove these entries from the log ? Le 31/01/2024 à 10:01, Andrey K a écrit : Hello, David, group values in your logs are BASE64-encoded binary AD-groups SIDs. You can try to decode them by a simple perl script sid-reader.pl (see below): echo

Re: [squid-users] Long Group TAG in access.log when using kerberos

2024-01-31 Thread Andrey K
Hello, David, group values in your logs are BASE64-encoded binary AD-groups SIDs. You can try to decode them by a simple perl script sid-reader.pl (see below): echo AQUAAAUVCkdDGG1JBGW2KqEShhgBAA== | base64 -d | perl sid-reader.pl And finally convert SID to a group name: wbinfo -s