Academic Journals Database
Disseminating quality controlled scientific knowledge

Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode

Author(s): Tejaswi Agarwal | Mike Leonetti

Journal: Advanced Computing : an International Journal
ISSN 2229-726X

Volume: 4;
Issue: 1;
Start page: 23;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Interception Proxy | Authentication | Squid | Cookie Based Authentication

Proxy servers are being increasingly deployed at organizations for performance benefits; however, there still exists drawbacks in ease of client authentication in interception proxy mode mainly for Open Source Proxy Servers. Technically, an interception mode is not designed for client authentication, but implementation in certain organizations does require this feature. In this paper, we focus on the World Wide Web, highlight the existing transparent proxy authentication mechanisms, its drawbacks and propose an authentication scheme for transparent proxy users by using external scripts based on the clients Internet Protocol Address. This authentication mechanism has been implemented and verified on Squid-one of the most widely used HTTP Open Source Proxy Server.
RPA Switzerland

Robotic Process Automation Switzerland


Tango Jona
Tangokurs Rapperswil-Jona