Using Squid Proxy for Authentication and Traffic Shaping

23
Zaher Wanli Mhd Hasan Serhan 1 Mhd Ali Al- Kateib Yasser Kamel Damascus University F.I.T.E Third Year Project Proxy for Authentication and Traffic shaping

description

FIT, Damascus University, Syria, 2011

Transcript of Using Squid Proxy for Authentication and Traffic Shaping

Page 1: Using Squid Proxy for Authentication and Traffic Shaping

Zaher Wanli

Mhd Hasan Serhan

1

Mhd Ali Al-Kateib

Yasser Kamel

Damascus UniversityF.I.T.E

Third Year Project

Proxy for Authentication and Traffic shaping

Page 2: Using Squid Proxy for Authentication and Traffic Shaping

2

Overview

Traffic Shaping

Authentication

Conclusion & Perspectives

Agenda

Page 3: Using Squid Proxy for Authentication and Traffic Shaping

3

Overview

Unauthorized access

Unfair Bandwidth Allocation

Non Educational

Sites Traffic Issues

Page 4: Using Squid Proxy for Authentication and Traffic Shaping

4

Overview

Traffic Shaping

Authentication

Conclusion & Perspectives

Page 5: Using Squid Proxy for Authentication and Traffic Shaping

5

• Proxy definition

• Proxy Features

Overview

Reverse ProxyForward Proxy

Caching Logging Privileges Bandwidth Management

Page 6: Using Squid Proxy for Authentication and Traffic Shaping

6

Squid Proxy Server

Access Control Lists Delay Pools

Squid features

• Bandwidth control

• Authenticators

• ISPs

• Open Source

• Cross-platform

Overview

Page 7: Using Squid Proxy for Authentication and Traffic Shaping

7

Overview

Traffic Shaping

Authentication

Conclusion & Perspectives

Page 8: Using Squid Proxy for Authentication and Traffic Shaping

8

Traffic Shaping

192.168.137.5

188.160.237.1

Squid proxy server

Page 9: Using Squid Proxy for Authentication and Traffic Shaping

9

• Types of buckets Aggregate bucket Network bucket Individual bucket

Traffic Shaping

• Delay pools classesClass 1

Has a single aggregate bucket Class 2

Has an aggregate bucket and 256 individual bucketsClass 3

Has an aggregate bucket and 256 network buckets

and 65536 individual buckets

Page 10: Using Squid Proxy for Authentication and Traffic Shaping

10

Overview

Traffic Shaping

Authentication

Conclusion & Perspectives

Page 11: Using Squid Proxy for Authentication and Traffic Shaping

Step 1 :. User requests a page through a proxy

Internet

HTTP Request

GET http://www.google.com/ HTTP/1.0

Authentication

Page 12: Using Squid Proxy for Authentication and Traffic Shaping

Step 2 : Proxy asks UA to authenticate

Internet

HTTP RequestHTTP/1.0 407 Proxy Authentication Required

Proxy-Authenticate: Basic realm="Squid proxy”

Authentication

Page 13: Using Squid Proxy for Authentication and Traffic Shaping

Step 3 : User sends proxy authentication credentials

Internet

HTTP Request

GET http://www.google.com/ HTTP/1.0Proxy-Authorization: Basic c3R1ZGVudF8wMDAx==...

Authentication

Page 14: Using Squid Proxy for Authentication and Traffic Shaping

Step 4 : Proxy accepts authentication and requests the page from the server

Internet

HTTP Request

GET / HTTP/1.0Via: 1.0 cache.iif.hu:3128 (Squid/2.4.DEVEL2)...

Authentication

Check DB

Page 15: Using Squid Proxy for Authentication and Traffic Shaping

Step 5 : Server sends the requested page

Internet

HTTP Response

HTTP/1.1 200 OKDate: Tue, 11 Feb 2000 18:41:04 GMTServer: Apache/1.3.9 (Unix)...

Authentication

Page 16: Using Squid Proxy for Authentication and Traffic Shaping

Step 6 : Proxy passes the result back to the user

Internet

HTTP Response

HTTP/1.1 200 OKDate: Tue, 11 Feb 2000 18:41:04 GMTServer: Apache/1.3.9 (Unix)...

Authentication

Page 17: Using Squid Proxy for Authentication and Traffic Shaping

17

Site Blocking

Page 18: Using Squid Proxy for Authentication and Traffic Shaping

Internet

HTTP Request

HTTP/1.1 200 OKDate: Tue, 11 Feb 2000 18:41:04 GMT...

Step 1: request not allowed page

Blocking

Page 19: Using Squid Proxy for Authentication and Traffic Shaping

Internet

HTTP Response

Step 1: request not allowed page

HTTP/1.1 200 OKDate: Tue, 11 Feb 2000 18:41:04 GMT...

Blocking

Redirection

Page 20: Using Squid Proxy for Authentication and Traffic Shaping

20

Overview

Traffic Shaping

Authentication

Conclusion & Perspectives

Page 21: Using Squid Proxy for Authentication and Traffic Shaping

21

Conclusion & Perspectives

Dynamic Traffic Shaping

Statistics

Off-Campus proxy

Page 22: Using Squid Proxy for Authentication and Traffic Shaping

22

Thanks for listening

Page 23: Using Squid Proxy for Authentication and Traffic Shaping

23