} else if (strncmp(token, "name=", 5) == 0) {
safe_free(s->name);
s->name = xstrdup(token + 5);
- } else if (strcmp(token, "transparent") == 0) {
- s->transparent = 1;
} else if (strcmp(token, "vhost") == 0) {
s->vhost = 1;
s->accel = 1;
else
self_destruct();
-#if LINUX_TPROXY
+ } else if (strcmp(token, "transparent") == 0) {
+ s->transparent = 1;
+ /* Log information regarding the port modes under interception. */
+ debugs(3, 1, "Starting Authentication on port " << s->s);
+ debugs(3, 1, "Disabling Authentication on port " << s->s << " (interception enabled)");
+#if LINUX_TPROXY
} else if (strcmp(token, "tproxy") == 0) {
s->tproxy = 1;
need_linux_tproxy = 1;
+ /* Log information regarding the port modes under transparency. */
+ debugs(3, 1, "Starting IP Spoofing on port " << s->s);
+ debugs(3, 1, "Disabling Authentication on port " << s->s << " (IP spoofing enabled)");
#endif
} else {
proxy as the client then thinks it is talking to an origin server and
not the proxy. This is a limitation of bending the TCP/IP protocol to
transparently intercepting port 80, not a limitation in Squid.
+ Ports flagged 'transparent' or 'tproxy' have authentication disabled.
=== Parameters for the basic scheme follow. ===
transparent Support for transparent interception of
outgoing requests without browser settings.
+ NP: disables authentication on the port.
tproxy Support Linux TPROXY for spoofing outgoing
connections using the client IP address.
+ NP: disables authentication on the port.
accel Accelerator mode. Also needs at least one of
vhost / vport / defaultsite.