SlideShare une entreprise Scribd logo
1  sur  15
SQUID
Squid – A HTTP 1.0 Proxy Server
                
                    Squid is a web based
                    proxy server based on
                    harvest cache demon ,
                    built in 1990`s.
                
                    A proxy server is an
                    intermeadiate server for
                    the clients , which seeks
                    resources from other
                    server (NET).
Why Web proxy ....?

    The developers of the HTTP protocol and the web
    analyst envisioned that , there would be an
    exponential growth in web content.

    There was a need of efficient distribution
    mechanism and powerfull caching primitives as well
    as not comprimising the security of the network.

    In the pursuit of developing content distribution and
    at the same time securing the web server , SQUID
    was evolved.
Web Filtering using SQUID

    SQUID works on content catching mechanism , by
    cached content the information will be fetched
    locally thus saving the bandwidth for ISP (internet
    service providers).

    SQUID filters the request from the users and
    fetched the desired outcome.

    The constraints on filtering and access permissions
    will be set by the network administrator .

    Filtering conditions is set using Regular
    Expressions.
Installation of SQUID

    The following command to be typed for installing
    SQUID
sudo apt-get install squid

    After installing SQUID , u will find it under
    directory /etc/squid

    The configuration file squid.conf exist under this
    directory , which has to be configured essential for
        1. Web Filtering
        2. Authentication
        3. Access Permissions to users
Starting the SQUID server

    The following command is written to start the
    server.
sudo /etc/init.d/ squid start

    To , ensure that the squid server is working properly
netstat -a -n | grep 3128 (3128 is default the port
  number).
Configuration of SQUID

    The configuration file can be opened by the
    following command
sudo gedit /etc/squid/squid.conf

    The config files is structured into tags.

    The essential tags are
        1. TAG: auth_param
        2. TAG: http_access
        3. TAG: acl
Configuration of SQUID

    To add various constraints on the web browsing
    through proxy server.We configure the squid.conf
    file

    To allow only particular range of IP `s , we
    configure it in TAG: acl block.

    acl internal_network src 192.168.0.0/24

    Then we allow the http acces to the specified
    internal_network in TAG: http_access block.
http_access allow internal_network

    The user accesing web through the proxy server,
    they have to set the IP in the given range.
Configuration of SQUID

    To filter the web content and not allow the users of
    the proxy server to access the web pages , A file has
    to be created in the SQUID folder and the list of
    websites to be blocked is added .

    In the TAG: http_access we deny the access.
http_access deny blacklist

    Since specifying the list of websites is a
    cumbersome process, the SQUID server is powered
    with regular expression to define a general pattern .
Configuration of SQUID

    The Regular Expression are specified in the file
    named blocks.file.acl .
.[Ee][Xx][Ee]$
.[Aa][Vv][Ii]$
.[Mm][Pp][Gg]$
.[Mm][Pp][Ee][Gg]$
.[Mm][Pp]3$

    In the TAG: http_access we deny the access.
    http_access deny blocks.file.acl
Web Page Authentication
    
        Squid associating with ncsa_auth
        program can be used to assign user
        name and password.
    
        To create user authentication
        htpasswd /etc/squid/passwd user1
    
        To change the read file premission
        chmod o+r /etc/squid/passwd
    
        You can verify it by locating it on
        /usr/lib/squid/ncsa_auth
NCSA Configuration

    In TAG: auth_param block , we specify the
    folowwing commands.
       auth_param basic program /usr/lib/squid/ncsa_auth
       /etc/squid/passwd
       auth_param basic children 5
       auth_param basic realm Squid proxy-caching web server
       auth_param basic credentialsttl 1 minutes
       auth_param basic casesensitive off


    In TAG: acl acl ncsa_users proxy_auth REQUIRED

    http_access allow ncsa_users

    The above command to allow the ncpa users
What not to Expect from SQUID..?

    SQUID is not a NIDS/NIPS (Network Intrusion
    Detection/Prevention System).

     You cannot monitor live network packets. Although
     there are other network tools which can be
    associated with them.
Which Section of people does squid
            appeal to....?

    In colleges and schools.

    In Small IT industries where network security is not
    their prime prioriy.

    Other organizations where hardware firewalls like
    CISCO is not feasible and they look forward for a
    simple solution.

    Parental Control.
Thank YOU...!

    This is not the end ........ There are other programs to
    enhance network security like

    1.SNORT
2. BASE (Basic analysis and Security Engine)
3. Honeyd Admin Interface.


    For further queries u can contact us

    mailme@himanshuarora@co.cc (Himanshu)

    rahul8590 @ gmail.com (Rahul)

Contenu connexe

Tendances

Tendances (20)

SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...
 
Proxy
ProxyProxy
Proxy
 
Docker Setting for Static IP allocation
Docker Setting for Static IP allocationDocker Setting for Static IP allocation
Docker Setting for Static IP allocation
 
Installation Openstack Swift
Installation Openstack SwiftInstallation Openstack Swift
Installation Openstack Swift
 
Kubernetes networking - basics
Kubernetes networking - basicsKubernetes networking - basics
Kubernetes networking - basics
 
Docker Security in Production Overview
Docker Security in Production OverviewDocker Security in Production Overview
Docker Security in Production Overview
 
青云CoreOS虚拟机部署kubernetes
青云CoreOS虚拟机部署kubernetes 青云CoreOS虚拟机部署kubernetes
青云CoreOS虚拟机部署kubernetes
 
Server hardening
Server hardeningServer hardening
Server hardening
 
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure  V1.0Defeating The Network Security Infrastructure  V1.0
Defeating The Network Security Infrastructure V1.0
 
Step by-step installation of a secure linux web dns- and mail server
Step by-step installation of a secure linux web  dns- and mail serverStep by-step installation of a secure linux web  dns- and mail server
Step by-step installation of a secure linux web dns- and mail server
 
Introduction to Haproxy
Introduction to HaproxyIntroduction to Haproxy
Introduction to Haproxy
 
Docker Security Paradigm
Docker Security ParadigmDocker Security Paradigm
Docker Security Paradigm
 
Apache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse ProxyApache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse Proxy
 
Acus08 Advanced Load Balancing Apache2.2
Acus08 Advanced Load Balancing Apache2.2Acus08 Advanced Load Balancing Apache2.2
Acus08 Advanced Load Balancing Apache2.2
 
How to turn any dynamic website into a static site | 24.01.2018 | Artem Danil...
How to turn any dynamic website into a static site | 24.01.2018 | Artem Danil...How to turn any dynamic website into a static site | 24.01.2018 | Artem Danil...
How to turn any dynamic website into a static site | 24.01.2018 | Artem Danil...
 
How To Deploy A Cloud Based Webserver in 5 minutes - LAMP
How To Deploy A Cloud Based Webserver in 5 minutes - LAMPHow To Deploy A Cloud Based Webserver in 5 minutes - LAMP
How To Deploy A Cloud Based Webserver in 5 minutes - LAMP
 
NGiNX, VHOSTS & SSL (let's encrypt)
NGiNX, VHOSTS & SSL (let's encrypt)NGiNX, VHOSTS & SSL (let's encrypt)
NGiNX, VHOSTS & SSL (let's encrypt)
 
Nginx dhruba mandal
Nginx dhruba mandalNginx dhruba mandal
Nginx dhruba mandal
 
NGINX: Basics & Best Practices - EMEA Broadcast
NGINX: Basics & Best Practices - EMEA BroadcastNGINX: Basics & Best Practices - EMEA Broadcast
NGINX: Basics & Best Practices - EMEA Broadcast
 
Linux Administration Tutorial | Configuring A DNS Server In 10 Simple Steps |...
Linux Administration Tutorial | Configuring A DNS Server In 10 Simple Steps |...Linux Administration Tutorial | Configuring A DNS Server In 10 Simple Steps |...
Linux Administration Tutorial | Configuring A DNS Server In 10 Simple Steps |...
 

En vedette

Sharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxSharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linux
jasembo
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
bryan_call
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

En vedette (20)

Pg py-and-squid-pypgday
Pg py-and-squid-pypgdayPg py-and-squid-pypgday
Pg py-and-squid-pypgday
 
Squid beak
Squid beakSquid beak
Squid beak
 
Squid proxy-server
Squid proxy-serverSquid proxy-server
Squid proxy-server
 
Sharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linuxSharing your-internet-connection-on-linux
Sharing your-internet-connection-on-linux
 
Resume Narya_UX Designer_2016
Resume Narya_UX Designer_2016Resume Narya_UX Designer_2016
Resume Narya_UX Designer_2016
 
Neogeography
NeogeographyNeogeography
Neogeography
 
Datasheets- albatross lab
Datasheets- albatross labDatasheets- albatross lab
Datasheets- albatross lab
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
Molluscan
MolluscanMolluscan
Molluscan
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 

Similaire à Squid Caching for Web Content Accerlation

17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]
Krisman Tarigan
 
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
Krisman Tarigan
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Servers
webhostingguy
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 

Similaire à Squid Caching for Web Content Accerlation (20)

Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-server
 
17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]
 
The secret life of a dispatcher (Adobe CQ AEM)
The secret life of a dispatcher (Adobe CQ AEM)The secret life of a dispatcher (Adobe CQ AEM)
The secret life of a dispatcher (Adobe CQ AEM)
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
FIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE Wednesday Webinars - How to Secure IoT Devices
FIWARE Wednesday Webinars - How to Secure IoT Devices
 
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
 
Information System Security
Information System Security Information System Security
Information System Security
 
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress GuideSquid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
Squid for Load-Balancing & Cache-Proxy ~ A techXpress Guide
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Servers
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
Apache Web Server Setup 4
Apache Web Server Setup 4Apache Web Server Setup 4
Apache Web Server Setup 4
 
[Devconf.cz][2017] Understanding OpenShift Security Context Constraints
[Devconf.cz][2017] Understanding OpenShift Security Context Constraints[Devconf.cz][2017] Understanding OpenShift Security Context Constraints
[Devconf.cz][2017] Understanding OpenShift Security Context Constraints
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure Apache SSL on CentOS 7How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure Apache SSL on CentOS 7
 
DevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran RoshanDevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran Roshan
 
Cloud Platform Symantec Meetup Nov 2014
Cloud Platform Symantec Meetup Nov 2014Cloud Platform Symantec Meetup Nov 2014
Cloud Platform Symantec Meetup Nov 2014
 
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
 
Service Discovery using etcd, Consul and Kubernetes
Service Discovery using etcd, Consul and KubernetesService Discovery using etcd, Consul and Kubernetes
Service Discovery using etcd, Consul and Kubernetes
 
Masterless Puppet Using AWS S3 Buckets and IAM Roles
Masterless Puppet Using AWS S3 Buckets and IAM RolesMasterless Puppet Using AWS S3 Buckets and IAM Roles
Masterless Puppet Using AWS S3 Buckets and IAM Roles
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Squid Caching for Web Content Accerlation

  • 2. Squid – A HTTP 1.0 Proxy Server  Squid is a web based proxy server based on harvest cache demon , built in 1990`s.  A proxy server is an intermeadiate server for the clients , which seeks resources from other server (NET).
  • 3. Why Web proxy ....?  The developers of the HTTP protocol and the web analyst envisioned that , there would be an exponential growth in web content.  There was a need of efficient distribution mechanism and powerfull caching primitives as well as not comprimising the security of the network.  In the pursuit of developing content distribution and at the same time securing the web server , SQUID was evolved.
  • 4. Web Filtering using SQUID  SQUID works on content catching mechanism , by cached content the information will be fetched locally thus saving the bandwidth for ISP (internet service providers).  SQUID filters the request from the users and fetched the desired outcome.  The constraints on filtering and access permissions will be set by the network administrator .  Filtering conditions is set using Regular Expressions.
  • 5. Installation of SQUID  The following command to be typed for installing SQUID sudo apt-get install squid  After installing SQUID , u will find it under directory /etc/squid  The configuration file squid.conf exist under this directory , which has to be configured essential for 1. Web Filtering 2. Authentication 3. Access Permissions to users
  • 6. Starting the SQUID server  The following command is written to start the server. sudo /etc/init.d/ squid start  To , ensure that the squid server is working properly netstat -a -n | grep 3128 (3128 is default the port number).
  • 7. Configuration of SQUID  The configuration file can be opened by the following command sudo gedit /etc/squid/squid.conf  The config files is structured into tags.  The essential tags are 1. TAG: auth_param 2. TAG: http_access 3. TAG: acl
  • 8. Configuration of SQUID  To add various constraints on the web browsing through proxy server.We configure the squid.conf file  To allow only particular range of IP `s , we configure it in TAG: acl block.  acl internal_network src 192.168.0.0/24  Then we allow the http acces to the specified internal_network in TAG: http_access block. http_access allow internal_network  The user accesing web through the proxy server, they have to set the IP in the given range.
  • 9. Configuration of SQUID  To filter the web content and not allow the users of the proxy server to access the web pages , A file has to be created in the SQUID folder and the list of websites to be blocked is added .  In the TAG: http_access we deny the access. http_access deny blacklist  Since specifying the list of websites is a cumbersome process, the SQUID server is powered with regular expression to define a general pattern .
  • 10. Configuration of SQUID  The Regular Expression are specified in the file named blocks.file.acl . .[Ee][Xx][Ee]$ .[Aa][Vv][Ii]$ .[Mm][Pp][Gg]$ .[Mm][Pp][Ee][Gg]$ .[Mm][Pp]3$  In the TAG: http_access we deny the access. http_access deny blocks.file.acl
  • 11. Web Page Authentication  Squid associating with ncsa_auth program can be used to assign user name and password.  To create user authentication htpasswd /etc/squid/passwd user1  To change the read file premission chmod o+r /etc/squid/passwd  You can verify it by locating it on /usr/lib/squid/ncsa_auth
  • 12. NCSA Configuration  In TAG: auth_param block , we specify the folowwing commands. auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/passwd auth_param basic children 5 auth_param basic realm Squid proxy-caching web server auth_param basic credentialsttl 1 minutes auth_param basic casesensitive off  In TAG: acl acl ncsa_users proxy_auth REQUIRED  http_access allow ncsa_users  The above command to allow the ncpa users
  • 13. What not to Expect from SQUID..?  SQUID is not a NIDS/NIPS (Network Intrusion Detection/Prevention System).  You cannot monitor live network packets. Although there are other network tools which can be associated with them.
  • 14. Which Section of people does squid appeal to....?  In colleges and schools.  In Small IT industries where network security is not their prime prioriy.  Other organizations where hardware firewalls like CISCO is not feasible and they look forward for a simple solution.  Parental Control.
  • 15. Thank YOU...!  This is not the end ........ There are other programs to enhance network security like  1.SNORT 2. BASE (Basic analysis and Security Engine) 3. Honeyd Admin Interface.  For further queries u can contact us  mailme@himanshuarora@co.cc (Himanshu)  rahul8590 @ gmail.com (Rahul)