@@ -24,3 +24,93 @@ Cheers
2424Amos
2525
2626
27+ From ngtech1ltd at gmail.com Wed Dec 3 13:31:46 2025
28+ From: ngtech1ltd at gmail.com (NgTech LTD)
29+ Date: Wed, 3 Dec 2025 15:31:46 +0200
30+ Subject: [squid-users] MFA with squid, is it possible?
31+ Message-ID: <CABA8h=R2_LzKNDmqiJjixPOrqNu7eHPWa1P5zuExFR8U_k_iTQ@mail.gmail.com>
32+
33+ I was wondering if it's possible to use 2fa with squid?
34+ If so, how?
35+ The authentication of squid is based on a couple methods, but, by what I
36+ can identify the 2fa? Is there any option to use some kind of token which
37+ can be acquired via some external authentication service?
38+ I am unsure if it's doable or not.
39+ I have seen a couple VPN services which offer 2fa, but all of these have
40+ connection based authentication.
41+
42+ The only service I have seen which has a nice concept of 2fa is Defguard.
43+ It uses Wireguard combined with psk.
44+ The flow is that the app contacts a management service and the 2fa
45+ authentication is done against this service.
46+ Then this service generates the WG config PSK and pushes it to the WG
47+ service.
48+ The app then connects with a combination of KEY+PSK.
49+ The detection of connection invalidation ("disconnection") is when there is
50+ no activity after 3 minutes on the WG peer(or by disconnection in the app).
51+ Then the PSK is automatically being revoked/changed in the peer config
52+ which blocks it' usage.
53+ It's not a perfect solution but it's a nice enough implementation.
54+
55+ The issue with a proxy connection is that the client-to-service connection
56+ is in plain text.
57+ So my assumption is that if we can secure the client-to-proxy and the
58+ generated config delivery to the client we can kind of consider it "secure
59+ enough".
60+
61+ I am wondering to myself about the available options in the proxy market.
62+
63+ Thanks,
64+ Eliezer
65+ -------------- next part --------------
66+ An HTML attachment was scrubbed...
67+ URL: <http://lists.squid-cache.org/pipermail/squid-users/attachments/20251203/6890db3f/attachment.htm>
68+
69+ From tony.albers at gmx.com Wed Dec 3 16:55:10 2025
70+ From: tony.albers at gmx.com (Tony Albers)
71+ Date: Wed, 03 Dec 2025 17:55:10 +0100
72+ Subject: [squid-users] MFA with squid, is it possible?
73+ In-Reply-To: <CABA8h=R2_LzKNDmqiJjixPOrqNu7eHPWa1P5zuExFR8U_k_iTQ@mail.gmail.com>
74+ References: <CABA8h=R2_LzKNDmqiJjixPOrqNu7eHPWa1P5zuExFR8U_k_iTQ@mail.gmail.com>
75+ Message-ID: <B8316C89-DAE5-4EA3-9B4F-88B2812B23EF@gmx.com>
76+
77+ On 3 December 2025 14:31:46 CET, NgTech LTD <ngtech1ltd at gmail.com> wrote:
78+ >I was wondering if it's possible to use 2fa with squid?
79+ >If so, how?
80+ >The authentication of squid is based on a couple methods, but, by what I
81+ >can identify the 2fa? Is there any option to use some kind of token which
82+ >can be acquired via some external authentication service?
83+ >I am unsure if it's doable or not.
84+ >I have seen a couple VPN services which offer 2fa, but all of these have
85+ >connection based authentication.
86+ >
87+ >The only service I have seen which has a nice concept of 2fa is Defguard.
88+ >It uses Wireguard combined with psk.
89+ >The flow is that the app contacts a management service and the 2fa
90+ >authentication is done against this service.
91+ >Then this service generates the WG config PSK and pushes it to the WG
92+ >service.
93+ >The app then connects with a combination of KEY+PSK.
94+ >The detection of connection invalidation ("disconnection") is when there is
95+ >no activity after 3 minutes on the WG peer(or by disconnection in the app).
96+ >Then the PSK is automatically being revoked/changed in the peer config
97+ >which blocks it' usage.
98+ >It's not a perfect solution but it's a nice enough implementation.
99+ >
100+ >The issue with a proxy connection is that the client-to-service connection
101+ >is in plain text.
102+ >So my assumption is that if we can secure the client-to-proxy and the
103+ >generated config delivery to the client we can kind of consider it "secure
104+ >enough".
105+ >
106+ >I am wondering to myself about the available options in the proxy market.
107+ >
108+ >Thanks,
109+ >Eliezer
110+
111+ Check out privacyidea.org
112+
113+ HTH
114+
115+ /tony
116+
0 commit comments