Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
btw, is proxy something that mask up my ip address?
last time someone told me that if i use a proxy, i could change my ipaddress(hiding the real 1)... is it about proxy?
Distribution: Red Hat Linux 9, FreeBSD 4.8, Knoppix 3.2
Posts: 182
Rep:
A proxy is best described something like "on behalf of ... "
Basically there are 2 methods for use to enable a group of computers on the internet (or another network) as if they're coming from one computer :
- Proxying
- Network masquerading
A proxy server has more capabilities (logging who does what, extended access control, caching posibilities, etc... ) while network masquerading is more basic, more on the 'network level'.
And yes, some people use someone else's proxy server to cover their tracks. That is called an 'open proxy'. Most of the time these are badly configured proxy servers which are crackable.
Edit : only the bad people (spammers, etc.. ) abuse these kind of badly configured proxies. I hate spammers.
Last edited by cropcircle; 06-29-2003 at 06:31 AM.
If you run Squid Proxy and validate the users on an Windows NT domain, is the users access written in the log file use the users name (or login) taken from NT, or the IP Address. The reason I ask is that we will be using Terminal Services with access to the internet via the Linux machine running Squid Proxy. Hense this will mean that all requests will come from the same IP address (the Windows Terminal Services Machine) but different user logins (whatever user is logged in).
Distribution: Red Hat Linux 9, FreeBSD 4.8, Knoppix 3.2
Posts: 182
Rep:
Scotttiamit : The way I personally use Squid is to allow certain IP adresses access to the proxy. Unfortunately, I've got no experience using Squid combined with NT authentication. However, the keywords which should help you further with this project are "squid + samba + winbind". Google for them, you'll find some posts scattered around the net about this subject. I found (among other) the following URL's :
Elliore : It's not good 'netiquette' (I hate that word) to hide behind _somebody else's_ IP-adress without that person knowing you doing that. Unless ofcourse, you build a machine _by yourself for yourself_ specially for that purpose. :-)
ah cropcircle, i have never meant to hide myself with other's ip... yes i wanna build my own.... i wanna use a spare computer to protect the main computer.... that's wat i'm planning and seeking a way to do..... that's y i asked my first question.....
back and back, a proxy server, like squid can do wat i'm wanting to accomplish?
squid will proxy for http, ftp, and a couple of other protocols but I think not IRC.
However you can run one machine as a router - IP masquerading, or NAT - and to protect an IRC connection from another machine. Course you can't hide the IP of the router!
I don't know where to look in slackware, but you could look up iptables, it's built into Linux 2.4 - http://www.netfilter.org/
Scotttiamit: are you asking about what's logged by squid? The one I'm working on, squid is logging the username and IP (on the LAN) for each access.
A destination webserver on the internet should be able to log only the squid box's IP, but squid can be configured to send HTTP headers that say "on-behalf-of". I don't believe the webserver will see any part of the user's authentication to squid.
If in doubt about this, visit a webserver where you know the admin, and ask for a look at the webserver logs. There are also proxy checkers that will tell you what information came with your web request, sorry don't have a URL.
Soob: What version do you use of squid? I am currently trialing SquidNT 2.5 on Windows, but don't mind moving to Linux box and running Squid. Prehaps the logging differs between these two versions? Are you using authentication? If so what type? I presume this is required as http header only include IP Addresses not usernames right?
I was also looking at using Smoothwall but again it is my understanding that usernames are not used in the log file.
Oo, I didn't even think of running squid on Windows. They've got squid 2.4stable7 on a redhat box. It uses the msnt_auth module to check user/pass against the NT server sitting next to it. Yeah, they want authent mostly to see who's costing them the most in downloads... I'm still working on that part.
Have a look through the squid FAQ, it gives great detail about what's in the logfiles. (It's a really comprehensive FAQ.) From the page below, it might be worth you trying a different log format, they seem to have different info.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.