Solved

Squid Logs

Posted on 2007-11-29
5
407 Views
Last Modified: 2013-11-15
I currently have squid running on Ubuntu 6.06 with 2 nics in bridge mode. I'm using iptables to redirect port 80 to Squid. This works great, but it currently logs IP addresses and I would like it log usernames instead. I don't necessarily want authentication, I just want this for logging. Can it be done?
0
Comment
Question by:Tharo_Systems
  • 2
  • 2
5 Comments
 
LVL 43

Accepted Solution

by:
ravenpl earned 250 total points
ID: 20375570
There's no such thing like user when no authentication (against squid) is performed.
You could try using ident for remote user identification, but novadays, nobody runs the server anyway.
http://www.maynidea.com/squidguard/ident.html
0
 
LVL 7

Expert Comment

by:killbrad
ID: 20422544
Right, it can be done but not without authentication.
0
 

Author Comment

by:Tharo_Systems
ID: 20423009
I don't care if there's authentication or not, I just don't want to have to configure each PC with proxy information.
0
 
LVL 7

Expert Comment

by:killbrad
ID: 20457879
put the squid box outside of the default gateway and make sure all the web traffic is forced through it.
Group policy also lets you set a proxy if you are in an AD environment, and that way you don't have to go to each machine at least.
0
 

Author Comment

by:Tharo_Systems
ID: 20458170
That wouldn't give me any more information in my logs than I have now. Plus I have 2 gateways.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
A list of useful business intelligence software.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now