[squid-users] Block WebRTC Leak using Squid

Sekar Duraisamy sekarit at gmail.com
Thu Aug 24 15:21:18 UTC 2017


I am using http_port 3128 ( direct proxy )

On Thu, Aug 24, 2017 at 5:33 PM, Eliezer Croitoru <eliezer at ngtech.co.il> wrote:
> Hey,
>
> Is the proxy a simple forward proxy or a transparent?
> Ie what "http_port" line looks like?
>
> Also, you should never use this:
> request_header_access Host deny all
>
> if you want http to work properly. I am not sure if it's possible to apply this rule.
> Try to use:
> forwarded_for delete
>
> All The Bests,
> Eliezer
>
> ----
> Eliezer Croitoru
> Linux System Administrator
> Mobile: +972-5-28704261
> Email: eliezer at ngtech.co.il
>
>
>
> -----Original Message-----
> From: squid-users [mailto:squid-users-bounces at lists.squid-cache.org] On Behalf Of Sekar Duraisamy
> Sent: Thursday, August 24, 2017 12:26
> To: squid-users at lists.squid-cache.org
> Subject: [squid-users] Block WebRTC Leak using Squid
>
> Hello All,
>
> I have configured squid with the following configuration.
>
> via off
> forwarded_for off
> request_header_access X-Forwarded-For deny all
> request_header_access Host deny all
>
> Squid Version : squid-3.5.20
>
> But still my local IP address and my public IP address are leaked when
> i test through WebRTC teat.
>
> Please provide your help to fix this issue.
>
> Thanks
> _______________________________________________
> squid-users mailing list
> squid-users at lists.squid-cache.org
> http://lists.squid-cache.org/listinfo/squid-users
>


More information about the squid-users mailing list