Hi Amos,

You're right. 
That was the reason of my question here.
I thought maybe there is a way to do it and I don't see it.

The drive behind this question is related to the illegal activities that
some users can perform behind the proxy coverage. We wanted to avoid storage
of access logs but keep the network design we use now.

Thank you for all the details and the help,

View this message in context: 
Sent from the Squid - Users mailing list archive at Nabble.com.

Reply via email to