Squid Proxy3.1
Squid Proxy3.1
Squid Proxy3.1
org
Squid Proxy
Partner Information
Product Information
Partner Name Web Site Product Name Version & Platform Product Description Squid Proxy www.squid-cache.org Squid Proxy 3.1 Squid is a caching proxy for the Web supporting HTTP, HTTPS, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems and is licensed under the GNU GPL.
squid-cache.org
Squid Proxy
Solution Summary
Squid is a fully-featured HTTP/1.0 compliant proxy working towards HTTP/1.1. Squid offers access control, authorization and logging environment to develop web proxy and content serving applications. Squid 3.1 sends all HTTP and HTTPS traffic to the DLP ICAP Server for inspection.
-2-
squid-cache.org
Squid Proxy
Note: The precompiled binary package of Squid does NOT contain SSL support.
-3-
squid-cache.org
Squid Proxy
Note: Your Squid switches may differ depending on the hardware, environment and options you choose.
Once Squid is compiled and installed successfully, youll need to test the server. To do so, set the proxy server setting in your web browser to point to the Squid server and make sure you can browse through the proxy. Do not continue until you have verified this step is working.
-4-
squid-cache.org
Squid Proxy
2.
Configuring Squid
The configuration file for Squid (squid.conf) is located in the /etc/squid3 directory. Open this file with the text editor of your choice and complete the steps below.
1. First, turn on ICAP support by adding the following lines to the bottom of the squid.conf file, each on a blank line: icap_enable on icap_service service_1 reqmod_precache 0 icap://192.168.1.1:1344/srv_conalarm icap_send_client_ip on
Note: The IP address 192.168.1.1 represents the IP address of your RSA DLP ICAP Server. 2. Next, allow HTTP transactions to be sent to the ICAP server by adding the following line: adaptation_access service_1 allow all
3.
To enable SSL support, locate the line in the squid.conf that reads: http_port 3128 Modify the line to read: http_port 3128 ssl-bump cert=/etc/squid3/server.crt key=/etc/squid3/server.key
4.
To make sure Squid always forwards the request without using any peers, which is needed for SSL support, add: always_direct allow all Finally, allow SSL requests by adding the follow line to the end of the file. ssl_bump allow all
5.
-5-
squid-cache.org
Squid Proxy
-6-
squid-cache.org
Squid Proxy
Once you have deployed the RSA DLP ICAP server, there are a number of steps required to configure the ICAP Server for proper inspection of HTTP/HTTPS content:
Enabling Detection of Content in URLs Configuring Content Blades to Detect Content in URLs and HTTP Forms Configuring HTTPS Encrypt Policy Actions
2.
3.
-7-
squid-cache.org
Squid Proxy
2.
Ensure that (as in the US Social Security Number example provided below) the option to detect content in URLs or HTML forms is Enabled for the given content blade.
3.
Save your changes and verify that this option is enabled for any other relevant content blades.
-8-
squid-cache.org
Squid Proxy
2.
Select your ICAP Server in the left-hand pane. Click Edit and select the appropriate HTTPS policy action. Consult the Enterprise Manager online help for more information on the behavior of each option presented.
3.
-9-
squid-cache.org
Squid Proxy
2.
The user enters credit card data in the body of the email which violates corporate policy.
3.
Upon clicking the Send button, the Block policy is invoked and the user sees the following message in the web browser.
- 10 -
squid-cache.org
Squid Proxy
Operating System
Windows Server 2003 CentOS Ubuntu 10.10
URL encoded with sensitive content URL encoded with sensitive content URL encoded with sensitive content
Plaintext form with sensitive content Plaintext form with sensitive content Plaintext form with sensitive content
- 11 -
squid-cache.org
Squid Proxy
URL encoded with sensitive content URL encoded with sensitive content URL encoded with sensitive content
Plaintext form with sensitive content Plaintext form with sensitive content Plaintext form with sensitive content
- 12 -
squid-cache.org
Squid Proxy
- 13 -
squid-cache.org
Squid Proxy
Content SharePoint, Microsoft OWA, HTTP, HTTPS SharePoint, Microsoft OWA, HTTP, HTTPS SharePoint, Microsoft OWA, HTTP, HTTPS
= Pass = Fail
Result
- 14 -
squid-cache.org
Squid Proxy
Known Issues
When issuing an HTTP or HTTPS GET request with Internet Explorer 8, you receive the following error message from the Squid Proxy server:
This issue has been fixed in DLP version 8.5.1.10047 and later.
- 15 -
squid-cache.org
Squid Proxy
Appendix
To enable debug mode for the Squid Proxy server, add the following line to the end of the squid.conf file and restart the server. debug_options ALL,9 Debug messages appear in the /var/log/squid3/cache.log file.
- 16 -