4 PDF
4 PDF
Outline
Topic: Proxy Server
1. Introduction
2. Body
a. Background
i. Introducing squid
ii. History of squid
iii. Software and hardware requirements
iv. Installation
b. Configuration
i. Configure as a web filter
ii. Configure authentication and access
iii. Configure as a caching server
iv. Configure to monitor traffic
v. Configure transparent mode
c. Results
i. Test access to websites
ii. Monitor Traffic
3. Conclusion
a. Summary
Abstract
Proxy servers act as intermediaries
between computing devices, to provide
security and to shield the hosts on an
internal network. It is important that
we
understand
the
purposes
and
help
protect
our
information,
Squid
discuss
access testing.
proxy
servers,
Introduction
Universities,
and
threats.
With
that
comes
Businesses
connectivity
the
potential
explosion,
vulnerability
while
keeping
their
IP
address
anonymous
or
universities,
large
difficult
network
Firewalls
task
administrators.
and
for
Scanners,
all
help
hidden.
businesses
Most
and
This
These
were reported.
reports. (3)
purposes
we
Wingate externally.
of
this
paper,
as
Increase
External users
a network
different
methods
will
help
The
The only
through
the
proxy
server.
In
(6)
proxy
server
for
security
and
[8]
Introducing Squid
hard drive.
Installation
The version of Squid that will be
installed is version 3.3.1. When
downloading squid the user will find
that there are multiple methods to
choose from. The easiest method for
CentOS is to use the command yum
install squid. CentOS will
automatically download and install the
necessary packages for running Squid.
Another method can be achieved by
browsing the Squid website and
downloading preconfigured binaries.
For this paper we will use the method
of downloading the source code and
compiling it. Downloading the source
code and compiling it gives the user
more control of configuration and
location of the directories. The source
packages can be found at the Squid
website. In this case the latest stable
version was downloaded (Version 3.3).
The source code will be a compressed
file available in a tar.gz format. After
downloading the source code the
compressed file has to be extracted into
--enable-cache-digests
--with-large-files
Configuration
this path
/usr/local/squid/etc/squid.conf.
--prefix
/local/usr/squid
--with-logdir
/var/log/squid
--with-pidfile
/var/run/squid/pid
--enable-store
Ufs,aufs
--enable-removal-
Lru,heap
policies
--enable-icmp
--enable-useragent-log
--enable-referer-log
[12]
# Recommended minimum
configuration:
#
# should be allowed
# RFC
# RFC
machines
www.youtube.com .googlevideo.com
.ytimg.com .yahoo.com .cnn.com
.theblaze.com .facebook.com
.nbcnews.com .abcnews.go.com
.twitter.com .foxnews.com
# http
# ftp
# https
# gopher
acl Saf
REQUIRED
Fig. 4
hierarchical levels.
in
squid/libexec/.
useful information.
[12]
Monitoring traffic
the
directory
is
Accessing
/usr/local/
the
cache
Some examples of
Intercept
Testing monitoring
was
executed:
tail
Results
Test Lab
The test environment includes a lan on the
192.168.0./24 network. The Squid server
shares the network with five PCs with
windows 7 installed. There will be five
machines including my PC that will be
connecting to the squid proxy server.
Refer to figure 5 for the diagram of the
network topology.
Testing web Filtering
The Squid
Authentication
Proxy
of
servers.
functionality.
Server
has
lot
Conclusion
Summary
two fronts.
authentication requests.
Performance is
manager.
Bibliography
[1] Lambert, P. (December, 2012 05). The basics of using a proxy server for privacy and security.
Retrieved from http://www.techrepublic.com/blog/security/the-basics-of-using-a-proxy-server-forprivacy-and-security/8762
[2] Smith, A., & Zichuhr, K. (2012, April 13). Internet adoption over time. Retrieved from
http://pewinternet.org/Reports/2012/Digital-differences/Main-Report/Internet-adoption-overtime.aspx
[3] Dixit, S., & Kumar Jha, P. (2008, April 01). Network security: It is a process, not a product.
Retrieved from http://www.scribd.com/doc/20364810/Network-Security-Research-Paper
[4] Exposing the underground: Adventures of an open proxy server. (n.d.). Retrieved from
http://www.secureworks.com/resources/articles/other_articles/proxies/
[5] DOI: Guide to Web Filtering Deployments Why Pass-By Filtering is Pass
[6] Felmann, A., Caceres, R., Douglis, F., Glass, G., & Rabinovich, M. (1999). Performance of web
proxy caching in heterogeneous bandwidth environments. Retrieved from
http://www.kiskeya.net/ramon/work/pubs/infocom99.proxy.pdf
[7] Mao, Z., & Herley, C. (2011). A robust link-translating proxy server mirroring the whole web. ACM SIGAPP
Applied Computing Review, 11(2), 30-42.
[8] Squid. (10, 12 20). Retrieved from http://www.squid-cache.org/Intro/
[9] Grance, T., Stevens, M., & Myers, M. (2003, October). Special Publication 800-36: Guide to
Selecting Information Technology Security Products. Retrieved from National Institute of
Standards and Technology: Publications: http://csrc.nist.gov/publications/PubsFL.html
[10] Radack, S. (2009, October). PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED
GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES. Retrieved from National Institute
of Standards and Technology: Publications, ITL Security Buletins:
http://csrc.nist.gov/publications/index.html.
[11]Roberts, H., Zuckerman, E., Faris, R., & Palfrey, J. (2010, October 14). 2010 Circumvention Tool
Usage Report. Retrieved from Berkman Center for Internet & Society at Harvard University:
http://cyber.law.harvard.edu/publications
[12] Saini, K. (2011). Squid Proxy Server 3.1: Beginner's Guide. Birmingham - Mumbai: PACKT
Publishing.
[13] Scarfone, K., & Hoffman, P. (2009, September). Special Publication 800-41 r1: Guidelines on
Firewalls and Firewall Policy. Retrieved from National Institute of Standards and Technology:
Publications: http://csrc.nist.gov/publications/PubsFL.html
[14] Scarfone, K., & Mell, P. (2012, July). Special Publication 800-94 r1(Draft): Guide to Intrusion
Detection and Prevention Systems(IDPS)(Draft). Retrieved from National Institute of
Standards and Technology: Publications: http://csrc.nist.gov/publications/index.html
Plan of Work
Dates
Jan 09 -11
Jan 12-24
Jan 25
Jan 26-feb 1
Week
1
2
3
4
Feb 02-08
Feb 09-15
Feb 16-22
Feb 23-march 1
March 2-08
March 25-29
March 30-april
5
Apr6-12
5
6
7
8
9
10
11
Work Done
Integration of teams.
Write abstract, bibliography, and outline.
Present abstract, bibliography, and outline.
Write introduction, submit outline, bibliography, abstract, and plan of
work.
Present introduction and Plan of Work.
Submit introduction.
Work on research installing linux CentOS and Squid.
Work on research to configure squid as a caching server.
Work on research to configure squid to filter web content.
Work on research to configure squid to monitor traffic.
Run tests on network performance, filtering, and monitoring.
12