44.17. Configuring the Squid Proxy Server Module

Like most modules, this one has several settings that you can edit to configure the user interface and the paths that it uses for Squid programs and configuration files. They can all be accessed by clicking on the Module Config link on the main page. The user interface fields are listed under Configurable options on the form that appears, while those related to program paths are under System configuration.

Because the module's default paths match those used by the Squid package for your Linux distribution or operating system (if there is one), fields in the second group do not generally need to be edited. If you are not using the supplied Squid package because you have compiled and installed the program from the source code, however, these paths will need to be changed.

A complete list of the module configuration fields and their meanings appears in Table 44.2.

Table 44.2. Module Configuration Options
Arguments to calamaris commandThis field sets the command-line arguments that will be passed to the calamaris program when it is run to generate a report. The default of –aw tells the program to include all available reports and to output in HTML format, but if this is not suitable you can change the behavior of the program by editing this field. Search for calamaris in the System Documentation module to get a complete list of available arguments.
Maximum log lines to pass to calamarisBecause a heavily used proxy may have millions of lines in its log files, the module only passes the last 50000 to Calamaris for analysis by default. This field can be used to edit that number or to force the processing of the entire log file when Unlimited is selected.
Encryption method for proxy passwordsWhen the module is used to create and edit proxy users, it assumes that the file they are in contains one user per line, in the following format:
username:encrypted-password.

This field determines the method of password encryption used. The default is crypt, which is the standard format used on UNIX systems. You can, however, select md5base64 instead to switch to MD5 encryption, which is used in the /etc/shadow file on most new Linux distributions. Be aware, though, that this will only work if the authentication program you have configured understands the MD5 format as well—the standard one that comes with this module does not. The only down side of the crypt format is that it is unable to differentiate passwords longer than 8 characters, and theoretically easier to crack.
Sort proxy usersIf Yes is selected, the list of users on the proxy authentication page will be sorted by username. If No is chosen, they will be listed in the order in which they were added.
Create proxy users when creating system usersThese fields are all related to UNIX-Squid user synchronization and are explained in Section 44.9 “Setting Up Proxy Authentication”.
Update proxy users when updating system usersThese fields are all related to UNIX-Squid user synchronization and are explained in Section 44.9 “Setting Up Proxy Authentication”.
Full path to squid config fileThis field must contain the full path to the Squid configuration file squid.conf, such as /usr/local/squid/etc/squid.conf.
Delete proxy users when deleting system usersThese fields are all related to UNIX-Squid user synchronization and are explained in Section 44.9 “Setting Up Proxy Authentication”.
Command to start squidThis field determines what happens when you click on the Start Squid link on any page. If Automatic is chosen, the command from the Squid executable configuration field is run with the appropriate arguments. You can, however, select the second radio button to specify some other script to be run. On Linux distributions that come with a Squid package, a command like /etc/init.d/squid start is used by default. This will not work, however, if you have compiled and installed the server from source instead of installing the package.
Command to stop squidLike the field above, this one determines the command to be run when Stop Squid is clicked. If Automatic is chosen, the program from the Squid executable field will be run with the shutdown parameter, which signals that running server process to exit.
Squid executableThis field must contain the full path to the Squid server program, appropriately named squid.
Full path to PID fileFor the module to determine if Squid is running or not, this field must contain the full path to its process ID file (if none is set in the configuration file).
Full path to squid cache directoryBecause the usual default Squid configuration file does not specify the cache directory, this field must contain the cache path that is compiled into the program on your system. If it is incorrect, the module's main page will keep on insisting that the cache needs to be initialized.
Squid cachemgr.cgi executableIf you want to use the module's statistics viewing feature, this field must contain the full path to the cachemgr.cgi program that comes with Squid.
Full path to squid log directoryFor the module's log analysis feature to work, this field must contain the full path to the directory contain Squid's access.log file, such as /usr/local/squid/log.
Path to calamaris log analysis programFor the Calamaris icon to appear on the main page, this field must contain the full path to the calamaris program. The rest of the module's features will work fine even if it is not installed.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.9.138