Solved

RUN socks with squid proxy server on linux

Posted on 1998-11-24
1
757 Views
Last Modified: 2012-06-27
sir
iam running squid(2.0 release) proxy server on redhat-5.0(2.0.35).i want to run socks  proxy along with it
to give my clients full internet access .
sir how should i proceed
anyone can give me detailed answer how to do it.
advance thanks
0
Comment
Question by:hitraj
1 Comment
 
LVL 1

Accepted Solution

by:
iNFaMouS earned 50 total points
ID: 1587687
The easiest way is t edit the squid "RunCache" script and put "runsocks" in the line that runs the squid program. Make sure you are using the latest release of socks, previous versions weren't compatible with squid. You need socks5-v1.0r5.

Here is part of RunCache:

echo "Running: runsocks squid -sY $conf >> $logdir/squid.out
2>&1"
start=`date '+%d%H%M%S'`
runsocks squid -sY $conf >> $logdir/squid.out 2>&1

You might need to put the socks username and
password into the script also, if you have configured
your socks to use authentication. For example:

 SOCKS5_USER=squid
 SOCKS5_PASSWD=ocean
 export SOCKS5_USER
 export SOCKS5_PASSWD


I am assuming that you have socks working on the unix system
where squid will be running.

Greetings
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question