SQUID:如何禁用身份验证?

时间:2013-11-07 05:18:23

标签: linux authentication squid

我有一个有效的Squid验证。如何暂时禁用身份验证?我可以在squid.conf中注释掉以下几行:

acl ncsa_users proxy_auth REQUIRED

auth_param基本程序/ usr / lib / squid3 / ncsa_auth / etc / squid3 / passwd auth_param基本孩子5 auth_param基本领域Squid代理缓存Web服务器 auth_param basic credentialstt1 2小时 auth_param基本casesensitive off

或者,我可以只禁用acl组的身份验证吗?

提前谢谢

4 个答案:

答案 0 :(得分:3)

我解决了..我只是注释掉了

#auth_param basic program /usr/lib/squid3/ncsa_auth /etc/squid3/passwd

然后注释掉了acl ncsa_users proxy_auth REQUIRED

#acl ncsa_users proxy_auth REQUIRED

acl ncsa_users dst 10.244.0.0/16 all

然后重新启动squid

我希望有人可能觉得这很有用。

答案 1 :(得分:1)

尝试:

注释:

#acl ncsa_users proxy_auth REQUIRED
#auth_param basic program /usr/lib/squid3/ncsa_auth /etc/squid3/passwd auth_param basic
#children 5 auth_param basic realm Squid proxy-caching web server auth_param basic  
#credentialstt1 2 hours auth_param basic casesensitive off

并修改:

http_access deny all

为:

http_access allow all 

答案 2 :(得分:0)

这对我有用,只有定义的IP允许使用鱿鱼

######################## Begin SQUID Config ########################
dns_v4_first on
dns_nameservers 8.8.8.8 8.8.4.4
# should be allowed
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12  # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7       # RFC 4193 local private network range
acl localnet src fe80::/10      # RFC 4291 link-local (directly plugged) machines
acl Safe_ports port 1-65535 # unregistered ports
acl allowed_user1 src  182.0.0.0/12  all
acl allowed_user2 src  182.1.0.0/12 all
acl allowed_user3 src  114.120.0.0/12  all
acl allowed_user4 src  114.124.0.0/12  all
acl allowed_user5 src  114.125.0.0/12  all
acl allowed_user6 src  114.127.0.0/12  all
acl allowed_user7 src  202.3.0.0/12  all
acl CONNECT method CONNECT
http_port 8080
http_access allow allowed_user1
http_access allow allowed_user2
http_access allow allowed_user3
http_access allow allowed_user4
http_access allow allowed_user5
http_access allow allowed_user6
http_access allow allowed_user7

# visible_hostname 192.168.1.1
### disable cache ###
cache deny all
### Anonymizing traffic ###
forwarded_for delete
request_header_access X-Forwarded-For deny all
request_header_access Via  deny all
############## END squid3 CONFIG ###################

答案 3 :(得分:-1)

#file /etc/squid/squid.conf

#squid 3.5.27 版

#操作系统 ubuntu 18.4

#last update 20201221

#cloud aws ec2

#aws ec2 安全组所有流量打开入站和出站

http_access 允许所有

http_port 3128

ACL SSL_ports 端口 443

acl Safe_ports 端口 80 # http

acl Safe_ports 端口 21 # ftp

acl Safe_ports 端口 443 # https

acl Safe_ports 端口 70 # gopher

acl Safe_ports 端口 210 # wais

acl Safe_ports 端口 1025-65535 # 未注册的端口

acl Safe_ports 端口 280 # http-mgmt

acl Safe_ports 端口 488 # gss-http

acl Safe_ports 端口 591 #filemaker

acl Safe_ports 端口 777 # multiling http

acl CONNECT 方法 CONNECT

http_access 允许本地主机管理器

http_access 允许本地主机

coredump_dir /var/spool/squid

refresh_pattern ^ftp: 1440 20% 10080

refresh_pattern ^gopher: 1440 0% 1440

refresh_pattern -i (/cgi-bin/|?) 0 0% 0

refresh_pattern (Release|Packages(.gz)*)$ 0 20% 2880

refresh_pattern 。 0 20% 4320