From: Balwinder S Dheeman on
On 09/08/2009 09:38 PM, Mark Hobley wrote:
> In comp.infosystems.www.browsers.x Balwinder S Dheeman <bsd.SANSPAM(a)cto.homelinux.net> wrote:
>
>> I think, is better you fix your filtering proxy server; you may add one
>> feature or more on entertaining/forwarding the requests based on
>> 'User-Agent', Remote-Address and, or other headers.
>
> The filter works fine, but I would like to bypass it for applications
> other than Mozilla Firefox. I don't think that the filter offers
> different facilities for different user-agents.

It can be extended, if it is an open source project; and that seems to
be right way to me.

>> IHMO, the system wide default IceWeasel or such settings is not good,
>> because competent users will/can still bye-pass your setup quite easily
>> via Edit->Preferences->Advanced->Network-Settings->(*)No Proxy option.
>
> The LockPref facility is supposed to prevent this. I think maybe there
> is a bug in Mozilla Firefox, which is preventing this from working.

Firefox/IceWeasel can be fixed or tweaked in either custom.

I hope so, but what if someone installs a personal version of Firefox,
Arora, Chromium or other one in his/her home directory which does not
read your system wide prefs?

IMHO, after reading
http://werc.homelinux.net/links/reference/unix_prog_design.pdf, you will
that today's Unix, Linux, *BSD, FF, KDE, GNOME and other programs of
software heading far away from the original concepts of Unix.

Cheers,
--
Balwinder S "bdheeman" Dheeman Registered Linux User: #229709
Anu'z Linux(a)HOME (Unix Shoppe) Machines: #168573, 170593, 259192
Chandigarh, UT, 160062, India Plan9, T2, Arch/Debian/FreeBSD/XP
Home: http://werc.homelinux.net/ Visit: http://counter.li.org/
From: Mark Hobley on
In comp.infosystems.www.browsers.x Balwinder S Dheeman <bsd.SANSPAM(a)cto.homelinux.net> wrote:

> I hope so, but what if someone installs a personal version of Firefox,
> Arora, Chromium or other one in his/her home directory which does not
> read your system wide prefs?

The /home directory is mounted noexec to prevent this.

Mark.

--
Mark Hobley
Linux User: #370818 http://markhobley.yi.org/

From: Mark Hobley on
In comp.infosystems.www.browsers.x Mark Hobley <markhobley(a)hotpop.donottypethisbit.com> wrote:
> Is there some additional configuration parameters, that I need to add in
> order to set and lock the proxy server address?

I have managed to solve this. To lock the proxy server, a full set of
configuration entries are required. Add the following lines to the
/etc/iceweasel/pref/iceweasel.js configuration file:

// Proxy server settings
lockPref("network.proxy.backup.ftp", "proxy.foobar.lan");
lockPref("network.proxy.backup.ftp_port", 9999);
lockPref("network.proxy.backup.gopher", "proxy.foobar.lan");
lockPref("network.proxy.backup.gopher_port", 9999);
lockPref("network.proxy.backup.socks", "proxy.foobar.lan");
lockPref("network.proxy.backup.socks_port", 9999);
lockPref("network.proxy.backup.ssl", "proxy.foobar.lan");
lockPref("network.proxy.backup.ssl_port", 9999);
lockPref("network.proxy.ftp", "proxy.foobar.lan");
lockPref("network.proxy.ftp_port", 9999);
lockPref("network.proxy.gopher", "proxy.foobar.lan");
lockPref("network.proxy.gopher_port", 9999);
lockPref("network.proxy.http", "proxy.foobar.lan");
lockPref("network.proxy.http_port", 9999);
lockPref("network.proxy.no_proxies_on", "localhost, 127.0.0.1, 10.0.0.0/8, 192.168.0.0/8, foobar.lan");
lockPref("network.proxy.share_proxy_settings", true);
lockPref("network.proxy.socks", "proxy.foobar.lan");
lockPref("network.proxy.socks_port", 9999);
lockPref("network.proxy.ssl", "proxy.foobar.lan");
lockPref("network.proxy.ssl_port", 9999);
lockPref("network.proxy.type", 1);

Regards,

Mark.

--
Mark Hobley
Linux User: #370818 http://markhobley.yi.org/
From: Balwinder S Dheeman on
On 09/15/2009 02:38 AM, Mark Hobley wrote:
> In comp.infosystems.www.browsers.x Mark Hobley <markhobley(a)hotpop.donottypethisbit.com> wrote:
>> Is there some additional configuration parameters, that I need to add in
>> order to set and lock the proxy server address?
>
> I have managed to solve this. To lock the proxy server, a full set of
> configuration entries are required. Add the following lines to the
> /etc/iceweasel/pref/iceweasel.js configuration file:
>
> // Proxy server settings
> lockPref("network.proxy.backup.ftp", "proxy.foobar.lan");
> lockPref("network.proxy.backup.ftp_port", 9999);
> lockPref("network.proxy.backup.gopher", "proxy.foobar.lan");
> lockPref("network.proxy.backup.gopher_port", 9999);
> lockPref("network.proxy.backup.socks", "proxy.foobar.lan");
> lockPref("network.proxy.backup.socks_port", 9999);
> lockPref("network.proxy.backup.ssl", "proxy.foobar.lan");
> lockPref("network.proxy.backup.ssl_port", 9999);
> lockPref("network.proxy.ftp", "proxy.foobar.lan");
> lockPref("network.proxy.ftp_port", 9999);
> lockPref("network.proxy.gopher", "proxy.foobar.lan");
> lockPref("network.proxy.gopher_port", 9999);
> lockPref("network.proxy.http", "proxy.foobar.lan");
> lockPref("network.proxy.http_port", 9999);
> lockPref("network.proxy.no_proxies_on", "localhost, 127.0.0.1, 10.0.0.0/8, 192.168.0.0/8, foobar.lan");
> lockPref("network.proxy.share_proxy_settings", true);
> lockPref("network.proxy.socks", "proxy.foobar.lan");
> lockPref("network.proxy.socks_port", 9999);
> lockPref("network.proxy.ssl", "proxy.foobar.lan");
> lockPref("network.proxy.ssl_port", 9999);
> lockPref("network.proxy.type", 1);
>
> Regards,

That's good.

But, what if the users use something other than IceWeasel?

Hope it works for you, but this IMHO is not the right way. I for one
shall never ever recommend such a weak setup. The best way to control
use of network is control it from your gateway/router possibly with the
help of filtering proxy sever. I have not checked, but am sure Squid can
do it by add-on scripts (adblocker comes into mind.

OTOH, If Squid seems too big and, or resource hungry to you, the Polipo
is an open source, tiny caching web (only http, but supports HTTP/1.1)
proxy designed to be used as a personal cache or a cache shared among a
few users. I think, it would good to add hooks for running scripts or
adding plug-ins to it for filtering.

--
Balwinder S "bdheeman" Dheeman Registered Linux User: #229709
Anu'z Linux(a)HOME (Unix Shoppe) Machines: #168573, 170593, 259192
Chandigarh, UT, 160062, India Plan9, T2, Arch/Debian/FreeBSD/XP
Home: http://werc.homelinux.net/ Visit: http://counter.li.org/
From: Joe Beanfish on
Balwinder S Dheeman wrote:
> On 09/15/2009 02:38 AM, Mark Hobley wrote:
>> In comp.infosystems.www.browsers.x Mark Hobley <markhobley(a)hotpop.donottypethisbit.com> wrote:
>>> Is there some additional configuration parameters, that I need to add in
>>> order to set and lock the proxy server address?
>> I have managed to solve this. To lock the proxy server, a full set of
>> configuration entries are required. Add the following lines to the
>> /etc/iceweasel/pref/iceweasel.js configuration file:
>>
>> // Proxy server settings
>> lockPref("network.proxy.backup.ftp", "proxy.foobar.lan");
>> lockPref("network.proxy.backup.ftp_port", 9999);
>> lockPref("network.proxy.backup.gopher", "proxy.foobar.lan");
>> lockPref("network.proxy.backup.gopher_port", 9999);
>> lockPref("network.proxy.backup.socks", "proxy.foobar.lan");
>> lockPref("network.proxy.backup.socks_port", 9999);
>> lockPref("network.proxy.backup.ssl", "proxy.foobar.lan");
>> lockPref("network.proxy.backup.ssl_port", 9999);
>> lockPref("network.proxy.ftp", "proxy.foobar.lan");
>> lockPref("network.proxy.ftp_port", 9999);
>> lockPref("network.proxy.gopher", "proxy.foobar.lan");
>> lockPref("network.proxy.gopher_port", 9999);
>> lockPref("network.proxy.http", "proxy.foobar.lan");
>> lockPref("network.proxy.http_port", 9999);
>> lockPref("network.proxy.no_proxies_on", "localhost, 127.0.0.1, 10.0.0.0/8, 192.168.0.0/8, foobar.lan");
>> lockPref("network.proxy.share_proxy_settings", true);
>> lockPref("network.proxy.socks", "proxy.foobar.lan");
>> lockPref("network.proxy.socks_port", 9999);
>> lockPref("network.proxy.ssl", "proxy.foobar.lan");
>> lockPref("network.proxy.ssl_port", 9999);
>> lockPref("network.proxy.type", 1);
>>
>> Regards,
>
> That's good.
>
> But, what if the users use something other than IceWeasel?
>
> Hope it works for you, but this IMHO is not the right way. I for one
> shall never ever recommend such a weak setup. The best way to control
> use of network is control it from your gateway/router possibly with the
> help of filtering proxy sever. I have not checked, but am sure Squid can
> do it by add-on scripts (adblocker comes into mind.
>
> OTOH, If Squid seems too big and, or resource hungry to you, the Polipo
> is an open source, tiny caching web (only http, but supports HTTP/1.1)
> proxy designed to be used as a personal cache or a cache shared among a
> few users. I think, it would good to add hooks for running scripts or
> adding plug-ins to it for filtering.
>

From previous posts it sounds like he's setting up a kiosk or similar
system where the users won't be able to get a shell or install software
so they probably won't have much choice about what to run.
First  |  Prev  |  Next  |  Last
Pages: 1 2 3
Prev: SO_BINDTODEVICE
Next: Ping domain name vs nslookup IP