You are on page 1of 6




squid-cache wiki








Immutable Page







MoinMoin Powered

Design by FrancescoChemolli (credits)

Hosting donated by MessageNet

Contents are their respective authors, licensed under the

Creative Commons Attribution Sharealike 2.5 License

Configuring Squid for NTLM with Winbind

Authentication on CentOS 5
By Joseph L. Casale
Warning: Any example presented here is provided "as-is" with no support or guarantee of
suitability. If you have any further questions about these examples please email the squid-users
mailing list.
This Configuration Example illustrates a simplified method to setup Squid on CentOS 5 (or any
RHEL 5 flavor) using built in configuration tools while enabling only the needed services for
authentication to be carried out by Winbind.
1. Configuring Squid for NTLM with Winbind Authentication on CentOS 5
1. Prerequisites
1. Network Time Protocol (NTP)

2. Samba and Winbind

3. Squid
2. Configure Kerberos
3. Configuring Squid
4. Notes

Network Time Protocol (NTP)
In order for Kerberos to function, proper time synchronization between your Active Directory
PDC Emulator and this server must be maintained.
Check if the ntp client is installed:
# rpm -qa ntp

If this query returns nothing, install it:

# yum install ntp

Now edit /etc/ntp.conf and comment out any lines that begin with server and create only one
that points to your Active Directory PDC Emulator.
Set the daemon to start automatically at boot and start it:
# vi /etc/ntp.conf
server pdce.example.local
# chkconfig ntpd on
# service ntpd start

Samba and Winbind

The Samba configuration file /etc/samba/smb.conf and Squid authentication helper
/usr/bin/ntlm_auth are provided by the samba-common package.
Check if the software is installed:
# rpm -qa |egrep -i '(krb5-workstation|samba-common|authconfig)'

If not, install it with yum:

# yum install authconfig krb5-workstation samba-common

Squid is available in the Base repo, check if it's installed:
# rpm -qa squid

If this query returns nothing, install it and/or set it to start at boot:

# yum install squid
# chkconfig squid on

Configure Kerberos
To enable Active Directory Group and User enumeration by the helper, we join the CentOS
server to Active Directory. You can use authconfig to configure Samba, Winbind and perform the
join in one step.

Replace ads.example.local with the fqdn of your Active Directory Server.

Replace EXAMPLE with the netbios name of your domain.

Replace EXAMPLE.LOCAL with the full name of your domain.

# authconfig --enableshadow --enablemd5 --passalgo=md5

--krb5kdc=ads.example.local \
--krb5realm=EXAMPLE.LOCAL --smbservers=ads.example.local
--smbworkgroup=EXAMPLE \
--enablewinbind --enablewinbindauth --smbsecurity=ads --smbrealm=EXAMPLE.LOCAL
--smbidmapuid="16777216-33554431" --smbidmapgid="16777216-33554431"
--winbindseparator="+" \
--winbindtemplateshell="/bin/false" --enablewinbindusedefaultdomain
--disablewinbindoffline \
--winbindjoin=Administrator --disablewins --disablecache --enablelocauthorize
[/usr/bin/net join -w EXAMPLE -S ads.example.local -U Administrator]
Administrator's password:
Using short domain name -- EXAMPLE
Joined 'SERVER' to realm 'EXAMPLE.LOCAL'
Shutting down Winbind services:
Starting Winbind services:

[ OK ]

If Winbind wasn't running before this it can't shutdown, but authconfig will start it and enable it
to start at boot.
The default permissions for /var/cache/samba/winbindd_privileged in RHEL/CentOS 5.4 were
750 root:squid (which worked by default) but are now 750 root:wbpriv in 5.5 which doesn't
allow the user Squid runs under to access the socket. Make sure squid.conf does not have a

cache_effective_group defined and add wbpriv as a supplementary group to the user Squid runs
# usermod -a -G wbpriv squid

You can test Active Directory Group and User enumeration by viewing the output of wbinfo:
# wbinfo -{u|g}

If you are able to enumerate your Active Directory Groups and Users, everything is working.

Configuring Squid
I created an Active Directory Group to control who gets access to the proxy. Check the man
pages for ntlm_auth for options.
Edit your /etc/squid/squid.conf to enable the helper and adjust our_networks accordingly:
auth_param ntlm program /usr/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp
auth_param ntlm children 5
auth_param ntlm keep_alive on
acl our_networks
acl ntlm proxy_auth REQUIRED
http_access allow our_networks ntlm

This is not an inclusive set of parameters for Squid to function but is what is required for
the authentication portion.


Current versions of Firefox are capable of ntlm authentication so you need not enable

You need not install the full Samba package, nor have smbd and nmbd running for
authentication to take place.


ConfigExamples/Authenticate/NtlmCentOS5 (last edited 2010-06-18 20:18:37 by JosephCasale)


Edit MYGROUP dari file : etc/samba/smb.conf