LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-04-2007, 06:19 PM   #1
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
What are the benefits to authenticating to Squid


Say you're in a Windows environment and your users already authenticate to the DC, what are the benefits to authenticating to a proxy like Squid?

I've heard that malware that needs to go through the proxy would fail because it wouldn't know that password. How exactly does that work? Do you have to authenticate every time you use your web browser?
 
Old 10-04-2007, 11:47 PM   #2
slimm609
Member
 
Registered: May 2007
Location: Chas, SC
Distribution: slackware, gentoo, fedora, LFS, sidewinder G2, solaris, FreeBSD, RHEL, SUSE, Backtrack
Posts: 430

Rep: Reputation: 67
Quote:
Originally Posted by OlRoy View Post
Say you're in a Windows environment and your users already authenticate to the DC, what are the benefits to authenticating to a proxy like Squid?

I've heard that malware that needs to go through the proxy would fail because it wouldn't know that password. How exactly does that work? Do you have to authenticate every time you use your web browser?
The are many reasons that you could/would want to use proxy authentication.

1. Make sure that all users are tracked. If the _have_ to authenticate to the proxy then they will surely be accounted for and logged.

2. Stop random users from just connecting to the network and using it as a open proxy.

3. create different access policies based on windows user groups.


There are a few different ways to setup proxy authentication. The best way for windows would prob. be transparent user auth.

When you set the proxy in IE or FireFox and go to a web site it will pass that information to the proxy. The proxy is configured for auth. so it will then send a request to the PC and ask for its domain user credentials. Once it does that it will then go and proxy the site for you.

Malware is a whole different issue. Malware will Phone-Home on random ports not 80 or 443.

If this is for a house thats fine but if it is for a company and you want more information on commerical proxies let me know and i can provide lots of information. I just finished R&D on the top 8 rated commerical web proxies.
 
Old 10-05-2007, 01:20 PM   #3
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Original Poster
Rep: Reputation: 86
Thanks slimm609. I don't have any plans on implementing authentication on a proxy, just curious as to the benefits of it, which you did a good job answering. :-)
 
Old 10-09-2007, 07:30 AM   #4
BrianWGray
Member
 
Registered: Oct 2003
Posts: 54

Rep: Reputation: 15
There are a lot of benefits for logging purposes and things like setting delayed pools to allow specified users more or less bandwidth with delay pools etc.

remember a couple things

authenticating users will normally add latency so check how your proxy performs with a control group before you fully implement it.

most windows spyware is going to use your IE configurations and IE engine meaning it will most likely authenticate anyway.

Last edited by BrianWGray; 10-09-2007 at 07:31 AM. Reason: double word
 
Old 10-09-2007, 07:53 AM   #5
slimm609
Member
 
Registered: May 2007
Location: Chas, SC
Distribution: slackware, gentoo, fedora, LFS, sidewinder G2, solaris, FreeBSD, RHEL, SUSE, Backtrack
Posts: 430

Rep: Reputation: 67
Quote:
Originally Posted by BrianWGray View Post
most windows spyware is going to use your IE configurations and IE engine meaning it will most likely authenticate anyway.
with transparent proxy authentication spyware will try and use the proxy but 99% of the time it will fail because the when you connnect to a proxy with transparent auth. the proxy sends a reply to the host asking for credentials. I have yet to see spyware that knows how to handle the authentication request. even more so if the credentials are from a domain. I dont doubt that there will be some but right now i am yet to see any spayware that does.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Benefits of an IDE? JMJ_coder Programming 10 09-27-2007 09:18 PM
Access authenticating FTP sites using FTP Clients on XP clients via SQUID munirg2003 Linux - Networking 2 06-12-2007 10:58 PM
squid giving error while authenticating with Microsoft ADS dsids Linux - Software 0 03-26-2007 05:20 AM
Would you like to know the benefits of being a Christian? AFriend General 4 02-09-2005 11:02 AM
Benefits of Linux? hazza96 Linux - General 4 02-01-2002 03:47 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:13 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration