Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Squid+Dansguardian with Active Directory (NTLM) Single Sign On WORKING!!!

    Scheduled Pinned Locked Moved Cache/Proxy
    135 Posts 44 Posters 131.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      alxbob
      last edited by

      I want to implement ldap kerberos squid authentication ! As far as i understand i wont use samba but why kdc is needed if i can use windows server kdc ?

      1 Reply Last reply Reply Quote 0
      • A
        alxbob
        last edited by

        Anyone?

        1 Reply Last reply Reply Quote 0
        • E
          eduardogd
          last edited by

          I'm using it as a lab, I've created two VM on Vbox and it can view etch other, but I can't pass this part:

          6.  Services –> Firewall
            a.  Rules –> LAN tab – Create a proxy rule to allow TCP port 3128 to the LAN address for testing (will change later)
            b.  NAT –> Port Forward tab - Create a proxy port forward from LAN on port 3128 to the loopback adapter (127.0.0.1) for testing

          could anyone show me how to do it?

          1 Reply Last reply Reply Quote 0
          • G
            ghosterius
            last edited by

            I've also given up on this one getting back to pfSense 2.1.5. I would like to dig deeper on this one as I feel that I've been pretty close to achieving the solution but unfortunately at this time I have no time available at all to dedicate on this subject. :(

            Once I have the time, if no one has found it yet, I'll redo it all again and document the changes.

            1 Reply Last reply Reply Quote 0
            • A
              atilaloise
              last edited by

              Consegui fazer o Squid com NTLM. Funciona com o stable e com o squid 3!

              https://drive.google.com/file/d/0BytRSGrf8eEXQzRvUXdNUUw2NTg/view

              esse é o passo a passo.

              espero que ajude

              1 Reply Last reply Reply Quote 0
              • G
                gdsnytech
                last edited by

                @atilaloise:

                Consegui fazer o Squid com NTLM. Funciona com o stable e com o squid 3!

                https://drive.google.com/file/d/0BytRSGrf8eEXQzRvUXdNUUw2NTg/view

                esse é o passo a passo.

                espero que ajude

                Hey do you have an english translation for this? thanks.

                1 Reply Last reply Reply Quote 0
                • G
                  gdsnytech
                  last edited by

                  @atilaloise:

                  Consegui fazer o Squid com NTLM. Funciona com o stable e com o squid 3!

                  https://drive.google.com/file/d/0BytRSGrf8eEXQzRvUXdNUUw2NTg/view

                  esse é o passo a passo.

                  espero que ajude

                  Also, does this implies Single Sign on? If not then how can i incorporate it with the set up? thanks.

                  1 Reply Last reply Reply Quote 0
                  • G
                    gdsnytech
                    last edited by

                    @sowen:

                    First: I don't mean to steal this thread…but there is an easier way to do much of this. Unless you absolutely must use NTLM.

                    look at
                    http://sourceforge.net/projects/squidtrust/files/SquidtrustIII/

                    or google "Squidtrust"

                    you will find a Perl authentication helper, and a workstation agent that can easily be integrated into a PfSense environment.
                    originally … I wrote the helper and agent to work on pfSense. I have been using them for over two years on a network w/800+ workstations and 2500+ users.

                    the short version:
                    Install the perl helper on pfSense, configure it to poll the agent for your desired user credentials.
                    run the agent on all workstations via login scrpt/GPO
                    ta-da...transparent user authentication.

                    read the docs for more detail.

                    How do you make this work? I have yet to have any success.

                    1 Reply Last reply Reply Quote 0
                    • S
                      sowen
                      last edited by

                      What's not working or what can't you get working ??

                      The client (SquidTrustIII) or the squid helper (perl script) side of things ??

                      1 Reply Last reply Reply Quote 0
                      • G
                        gdsnytech
                        last edited by

                        @sowen:

                        What's not working or what can't you get working ??

                        The client (SquidTrustIII) or the squid helper (perl script) side of things ??

                        The perl helper can not contact the client even with the windows firewall disabled.

                        I keep getting "ERR" when running test via SSH.

                        The helper input in Squid causes it to crash when it is applied in the customer settings area. I have tried it in both 'Before auth' section and 'integration' section.

                        1 Reply Last reply Reply Quote 0
                        • D
                          DangerMouse
                          last edited by

                          Great steps so far but im stuck at the point of joining the domain, i keep getting
                          cannot join as standalone machine

                          can anyone help with this?

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.