Index

$
in wildcards
Understanding Wildcard Patterns

*
in wildcards
Understanding Wildcard Patterns

?
in wildcards
Understanding Wildcard Patterns

^
in wildcards
Understanding Wildcard Patterns

access
logging
AddLog

access control
Access Control
based on requested URL
Require Proxy Authentication
example host restrictions
Restricting Allowed Hosts
resources and
Control Access to This Resource Through This Proxy
Access Control
restricting hosts
Restricting Allowed Hosts
user databases and
User Databases
Require Proxy Authentication

Access Log
Access Log File
defined
Server Logging Configuration
DNS lookup and
Access Log File
extended format described
Access Log File
format of
Access Log File
IP addresses and
Access Log File
sample of
Access Log File

AddLog directive
obj.conf
AddLog

Admin Interface Protection
Admin Interface Protection

administration forms
accessing locally
Access Control
cache manager
From the Administration Forms
no access to
Access Control
starting
Using the Netscape Proxy Manager

Administration password
admpw File

administrative user name
changing
Changing the Administrative User Name and Password

admpw file
admpw File

application security
Why Do I Need Security?

auth-type function
AuthTrans

AuthTrans directive
obj.conf
AuthTrans

bandwidth, saving
Caching HTTP vs. FTP and Gopher

bytestream
SSL and
How Does SSL Work?

cache
clean up
What is the Garbage Collector?
configuration recommendation
Optimizing Cache Document Retrieval
configuring
Default Caching Configuration
defined
Glossary
directories
determining
Filename and Directory
maintaining
What is the Garbage Collector?
numbers of
Limiting the Number of Cache Directories
splitting over file systems
Moving or Splitting the Cache Directory
directory structure
Cache Directory Structure
disk space
How Caching Works
enabling
init-cache
files
viewing
Using the Cache Manager
garbage collection
Configuring the Garbage Collector
lock timeout
Cache Lock Timeout
moving directories
Moving or Splitting the Cache Directory
options
Default Caching Configuration
performance and
Cache Size
performance report
Interpreting the pstats Output
protocols
init-cache
rebuilding directory structure
Rebuilding the Cache Directory Structure
removing files
How Garbage Collection Works
Expiring and Removing Documents in the Cache
repairing URL database
Repairing the Cache URL Database
size
optimizing
Limiting the Number of Cache Directories
stale data
Remote Server Unavailable
strategy
Caching Strategy
figure of
Is the Cache Used?
usage lists
Interpreting the pstats Output

cache directory
rebuilding
Rebuilding the Cache Directory Structure
repairing URL database
Repairing the Cache URL Database

cache directory hierarchy
defined
Glossary

cache expiration
Cache Expiration Setting

cache file dispersion
Dispersion of Files in the Cache

cache files
dispersion of
Dispersion of Files in the Cache
information on
View Cached Information for This Resource
naming scheme
Filename and Directory
removing
Expiring and Removing Documents in the Cache
viewing
Using the Cache Manager

cache manager
accessing via administration forms
From the Administration Forms
accessing via resource manager
From the Resource Manager
resources and
View Cached Information for This Resource
using
Using the Cache Manager

cache refresh
defined
Glossary

cache refresh setting
Cache Refresh Setting

cache repair
defined
Glossary

cache root
defined
Glossary
specifying
init-cache

cache root directory
Cache Directory Structure

cache size
described
Cache Size
directories and
Limiting the Number of Cache Directories
specifying manually
init-cache

cache-setting function
ObjectType

caching
Default Caching Configuration
based on URLs
Inhibit/Enable Caching of This Resource
configuration
Is the Cache Used?
configuration recommendation
Optimizing Cache Document Retrieval
described
How Caching Works
Enabling Caching
directory structure
Cache Directory Structure
enabling
Enabling Caching
HTTP documents
Caching HTTP vs. FTP and Gopher
optimizing
Optimizing Cache Document Retrieval
parameters for resources
Set Caching Parameters for This Resource
performance report
Interpreting the pstats Output
protocols
Is a Document Up to Date?
init-cache
figure of
Is the Cache Used?
queries
Limit the Length of Cached Queries for This Resource
ObjectType
remote server unavailable
Remote Server Unavailable
removing files from
Remove All the Items Cached for This Resource
removing old files
Configuring the Garbage Collector
resources
Inhibit/Enable Caching of This Resource
strategy
Is the Cache Used?
Caching Strategy
usage lists
Interpreting the pstats Output
viewing information
View Cached Information for This Resource

caching protocols
Cached Protocols

caching strategy
Caching Strategy

CERN
Glossary

CERN proxy server
compatibility with
What is the Netscape Proxy Server?

CGI Object
obj.conf and
CGI Object

chaining proxies
Use Another Proxy for Retrieving This Resource
figure of
Use Another Proxy for Retrieving This Resource

child processes
Create an IRIX User Account

Chroot
magnus.conf directive
Chroot

client-pull
Proxy Timeout

clients
accessing the proxy
Server Port Number
error message text (customizing)
Customize Error Messages

CNAME
DNS and
Create an Alias for the Server

common logfile format
Glossary

configuration files
Proxy Configuration Files

configuration forms
Using the Proxy Server Manager Configuration Forms

configuring HTTPS proxying
Configuring HTTPS Proxying

configuring SOCKS
SOCKS Daemon Configuration

connect method
proxying
Enable/Disable Proxying of a Resource
SSL and
SSL Proxy Protocol: Technical Details

controlling access to the proxy
Access Control
User Databases

conventions
Some Conventions Used in This Guide

converting NCSA user databases
Converting an NCSA or Text File to a User Database

data encryption
Why Do I Need Security?

data retrieved
out of date
Cache Refresh Setting

data stream
SSL and
What About SSL and the Proxy Server?

default object
obj.conf
The Default Object

deny-service function
The Default Object
Service
PathCheck

denying access to resources
Enable/Disable Proxying of a Resource

directive syntax
Directive Syntax

directives
magnus.conf
Directives in magnus.conf

directories
cache
Cache Directory Structure
server root
Server Root

disk space
cache and
How Caching Works

dispersion of cache files
Dispersion of Files in the Cache

DNS
defined
Glossary

DNS alias
Glossary

DNS lookup
CPU cycles and
Access Log File

documents
average transfer time
Interpreting the pstats Output
cache and
How Caching Works
expiring
Expiring and Removing Documents in the Cache
expiring in the cache
Cache Expiration Setting
getting out of date
Remote Server Unavailable
large, timeout and
Cache Lock Timeout
optimizing caching of
Optimizing Cache Document Retrieval
out of date
Cache Refresh Setting
removing from the cache
Remove All the Items Cached for This Resource
Expiring and Removing Documents in the Cache
retrieving if up-to-date
Cache Refresh Setting
up-to-date
Cache Refresh Setting
up-to-date checks
Is a Document Up to Date?

Domain Name System, using with proxy
Make Sure DNS is Up and Running

domain name, proxy
Server Name

EMACS
Glossary

enabling caching
Enabling Caching

encryption, passwords not using
Require Proxy Authentication

Error directive
obj.conf
Error

Error Log
defined
Server Logging Configuration
described
The Error Log File

error messages, customizing
Customize Error Messages

ErrorLog
magnus.conf directive
ErrorLog

errors
customized messages for
Customize Error Messages
logging
The Error Log File
sending customized messages
Error
viewing
The Error Log File

/etc/passwd
Create an IRIX User Account

existing URL mappings
editing
Editing Existing Mappings

Expires header
defined
Glossary
needed to cache query results
Limit the Length of Cached Queries for This Resource

expiring cache files
Cache Expiration Setting

expiring resources
Expire All Cached Items for This Resource

extended log file
format defined
Glossary
sample of
Access Log File

file extension, defined
Glossary

file type, defined
Glossary

files
dispersion in cache
Dispersion of Files in the Cache
mapping types of
mime.types File
out of date
Cache Refresh Setting

filtering headers
Filter Outgoing Headers

FTP
caching
Cached Protocols
Is a Document Up to Date?
Caching HTTP vs. FTP and Gopher
caching effectively
Cache Refresh Setting

Full Configuration
Using the Proxy Server Manager Configuration Forms

garbage collection
described
Configuring the Garbage Collector
process described
How Garbage Collection Works
setting times for
Garbage Collection Times

garbage collector
defined
Configuring the Garbage Collector
Glossary
described
What is the Garbage Collector?
determining files to remove
How Garbage Collection Works
emergency starts
Emergency Garbage Collection
priority for running
Garbage Collector Process Priority
process priority
Garbage Collector Process Priority

garbage collector and
How Garbage Collection Works

Garbage Collector Daemon
What is the Garbage Collector?

GET method
Service
needed to cache query results
Limit the Length of Cached Queries for This Resource
proxying
Enable/Disable Proxying of a Resource

GIF, defined
Glossary

Gopher
caching
Cached Protocols
Caching HTTP vs. FTP and Gopher
Is a Document Up to Date?
caching effectively
Cache Refresh Setting

hang-up signal (-HUP)
Basic Server Configuration

HEAD method
Service
proxying
Enable/Disable Proxying of a Resource

headers
filtering
Filter Outgoing Headers

hostname
defined
Glossary
Make Sure DNS is Up and Running

hosts
excluded from administration forms
Access Control
logging
Access Log File
restricting
Restricting Allowed Hosts
examples of
Restricting Allowed Hosts
restricting access to resources
Control Access to This Resource Through This Proxy

HTML, defined
Glossary

HTTP
caching
Cached Protocols
Is a Document Up to Date?
caching effectively
Cache Expiration Setting
defined
Glossary
SSL and
How Does SSL Work?
used with HTTPS
What is HTTPS?

HTTPD
defined
Glossary

HTTPS
defined
What is HTTPS?
Glossary
proxying
configuring
Configuring HTTPS Proxying
SSL and
What About SSL and the Proxy Server?

ident-check
init-sockd

identd
SOCKS and
Remote Identity Check

Init
magnus.conf directive
Init

init-cache
cache size and
Limiting the Number of Cache Directories
magnus.conf directive
init-cache

init-clf
magnus.conf directive
init-clf

init-proxy
magnus.conf directive
init-proxy

init-sockd
magnus.conf directive
init-sockd

inode
proxy uses
init-clf

installation
preparation for
Before You Begin Installing
user account needed
Root or User Installation

Internet Protocol (IP)
defined
Make Sure DNS is Up and Running

IP address, defined
Glossary

iponly function
AddLog

jail, proxy in
Chroot

KILL signal
Cache Lock Timeout

large documents, cache timeout and
Cache Lock Timeout

last-modified date
using to estimate a document's life
Cache Expiration Setting

last-modified factor
Cache Expiration Setting

Last-Modified header
needed to cache query results
Limit the Length of Cached Queries for This Resource

lm-factor
ObjectType

lm-factor, manually specifying
init-cache

load-types
magnus.conf directive
load-types

LoadObjects
magnus.conf directive
LoadObjects

Local Access Object
obj.conf and
Local Access Object

local-types
load-types

locked files
cache and
Cache Lock Timeout
transaction times and
Cache Lock Timeout

log files
AddLog

log-name (SOCKS)
init-sockd

log-type (SOCKS)
init-sockd

logging
SOCKS requests
SOCKD Logging

logging errors
The Error Log File

magnus.conf
described
magnus.conf File
directives in
Directives in magnus.conf
format of
magnus.conf File
sample file
magnus.conf File

mapping
URLs to mirror servers
Mapping URLs to Mirror Servers

max-uncheck function
ObjectType

MaxProcs
magnus.conf directive
MaxProcs

MD5, defined
Glossary

memory
processes and
Server Processes
resetting
ProcessLife

message integrity
Why Do I Need Security?

methods
proxy and
Service
proxying
Enable/Disable Proxying of a Resource

MIME
defined
Glossary

mime-types
load-types

mime.types file
mime.types File
sample of
mime.types File

MinProcs
magnus.conf directive
MinProcs

mirror
NameTrans

mirror servers
mapping URLs to
Mapping URLs to Mirror Servers

NameTrans directive
obj.conf
NameTrans

NCSA
defined
Glossary

NCSA server
compatibility with
What is the Netscape Proxy Server?

NCSA user databases
converting
Converting an NCSA or Text File to a User Database

Netscape Garbage Collector Daemon
Configuring the Garbage Collector

Netscape Navigator
passwords and
Require Proxy Authentication
proxy user authentication
Require Proxy Authentication
SSL and
What About SSL and the Proxy Server?
SSL instead of HTTPS
What is HTTPS?

Netscape Proxy Manager, starting
Using the Netscape Proxy Manager

network
remote server unavailable
Remote Server Unavailable

network data packets
time interval between
Proxy Timeout

network security
HTTPS and
What is HTTPS?

network-level security
Why Do I Need Security?

networks
disconnecting proxy from
Connecting To and Disconnecting From the Network

NIS
defined
Glossary

nobody
Create an IRIX User Account

nobody user account
Proxy Server User

ns-gc
Configuring the Garbage Collector

obj.conf
directives in
Directives in obj.conf
required objects in
Required Objects for obj.conf
structure of
Structure of obj.conf

obj.conf file
described
obj.conf File

object configuration
obj.conf File

objects
default
specifying
RootObject
proxy and
How the Proxy Server Handles Objects
proxying
ObjectType
setting options for
Using the Resource Manager

ObjectType directive
obj.conf
ObjectType

optimizing caching
Optimizing Cache Document Retrieval

overview of this manual
What's In This Book?

password file
Glossary

passwords
Administration
admpw File
administrative, changing
Changing the Administrative User Name and Password
Netscape Navigator and
Require Proxy Authentication
proxy access and
Require Proxy Authentication
transmitted without encryption
Require Proxy Authentication
user authentication
Require Proxy Authentication

PathCheck directive
obj.conf
PathCheck

paths
absolute with Chroot directive
Chroot

performance
cache size and
Cache Size

permissions
proxy and
Proxy Server User

pid file (process id)
Basic Server Configuration

PidLog
magnus.conf directive
PidLog

Port
magnus.conf directive
Port

port numbers
recommended
Choose a Unique Port Number
starting the proxy
Choose a Unique Port Number

ports
1080 (SOCKS)
Server Port Number
23 (telnet)
Server Port Number
80 (HTTP)
Server Port Number
above 1024
Server Port Number
changing
Server Port Number
clients and
Server Port Number
proxy
Server Port Number
recommended
Server Port Number
security risks
Configuring SSL proxying
specifying
Port
SSL and
Configuring SSL proxying

POST method
Service
proxying
Enable/Disable Proxying of a Resource

process id
proxy
Basic Server Configuration

process load
Starting and Stopping the Server Manually

process owner
Create an IRIX User Account

processes
garbage collector and
Garbage Collector Process Priority
maximum number of
MaxProcs
memory usage and
Server Processes
minimum number of
MinProcs
proxy and
Server Processes
RAM and
Server Processes
recommended number of
Server Processes
respawning
ProcessLife
table of recommended
Server Processes

ProcessLife
magnus.conf directive
ProcessLife

protocols
caching
init-cache
Cached Protocols
secure (HTTPS)
What is HTTPS?
SSL and
Why Do I Need Security?
What is SSL?

proxy
access
restricting
Require Proxy Authentication
cache size and
Cache Size
caching
described
How Caching Works
chaining
Use Another Proxy for Retrieving This Resource
ObjectType
figure of
Use Another Proxy for Retrieving This Resource
clients and servers, figure of
How Caching Works
compatibility
What is the Netscape Proxy Server?
configuring SSL
Configuring SSL proxying
controlling access to
User Databases
described
What is the Netscape Proxy Server?
directory installed in
Server Root
disconnecting from network
Connecting To and Disconnecting From the Network
fast demo mode
Connecting To and Disconnecting From the Network
features overview
What is the Netscape Proxy Server?
HTTPS and SSL with browsers
What is HTTPS?
HUP signal
PidLog
initializing
Init
jailing of
Chroot
killing
PidLog
log file format
init-proxy
networks
Connecting To and Disconnecting From the Network
objects and
How the Proxy Server Handles Objects
performance
DNS lookup and
Access Log File
ports above 1024
Server Port Number
ports under 1024
Proxy Server User
processes
Server Processes
reconfiguring
Basic Server Configuration
request hangs (remedy for)
Proxy Timeout
request times
Interpreting the pstats Output
restricting access to
Access Control
root user
Proxy Server User
security
SSL and
What About SSL and the Proxy Server?
security risks
Configuring SSL proxying
slow
Server Processes
SSL
figure of
What About SSL and the Proxy Server?
SSL and
What About SSL and the Proxy Server?
starting
user account for
Proxy Server User
TERM signal
PidLog
timeout
init-proxy
tracking users
Access Log File

proxy chaining
ObjectType

Proxy Manager
accessing locally
Access Control

proxy name
changing
Server Name

proxy security
Why Do I Need Security?

proxy server
configuring
Choosing a Resource to Configure

proxy timeout
Proxy Timeout

proxy user account
Proxy Server User

proxy-auth function
AuthTrans

proxy-log function
The Default Object
AddLog

proxy-retrieve function
Service

proxying HTTPS
configuring
Configuring HTTPS Proxying

proxying resources
Enable/Disable Proxying of a Resource

pstats utility
interpreting output
Interpreting the pstats Output
using
Using the pstats Utility

queries
caching
ObjectType
caching results of
Limit the Length of Cached Queries for This Resource

Quick Configuration forms
Using the Proxy Server Manager Configuration Forms

race conditions
Cache Lock Timeout

RAM
defined
Glossary
processes and
ProcessLife
Server Processes

rc.local
Glossary

realm
defined
Glossary
defining
Require Proxy Authentication

recommended cache configuration
Optimizing Cache Document Retrieval

redirection
Glossary

refresh
cache setting
Cache Refresh Setting

remote hostname logging
Access Log File

remote identity checks
SOCKS and
Remote Identity Check

remote server unavailable
Remote Server Unavailable

remote servers
not responding
Proxy Timeout
status codes from
Interpreting the pstats Output

require proxy authentication
Require Proxy Authentication

resource
defined
Glossary

resource manager
cache manager and
From the Resource Manager
using
Using the Resource Manager
Using the Resource Manager

resource wildcards
defined
Using the Resource Manager
examples of
Choosing a Resource to Configure

resources
access control and
Control Access to This Resource Through This Proxy
cache manager and
View Cached Information for This Resource
caching
Cached Protocols
Inhibit/Enable Caching of This Resource
caching parameters
Set Caching Parameters for This Resource
configuring
Choosing a Resource to Configure
Configuring a Resource
controlling access to
Access Control
defined
Using the Resource Manager
disabling proxying of
Enable/Disable Proxying of a Resource
examples of
Choosing a Resource to Configure
expiring
Expire All Cached Items for This Resource
proxies and
Use Another Proxy for Retrieving This Resource
proxy chaining figure
Use Another Proxy for Retrieving This Resource
proxying
ObjectType
removing
Remove All Your Settings to This Resource
removing from cache
Remove All the Items Cached for This Resource
restricting access to
Control Access to This Resource Through This Proxy
Control Access to This Resource Through This Proxy
sample wildcard patterns of
Choosing a Resource to Configure
SOCKS and
Use SOCKS When Retrieving This Resource
using
Using the Resource Manager
viewing cached information
View Cached Information for This Resource

resources. See also objects
Proxy Configuration Files

response time
remote servers and
Proxy Timeout

restricting access
Access Control

restricting access to the proxy
Require Proxy Authentication

restricting hosts
Restricting Allowed Hosts

restricting resources
Control Access to This Resource Through This Proxy

root
defined
Glossary
log in as
Starting and Stopping the Server Manually
Create an IRIX User Account
proxy and
Proxy Server User

RootObject
magnus.conf directive
RootObject

RSA MD5 algorithm
Filename and Directory

sample object
Sample Object

Secure Sockets Layer. See SSL
Security

security
described
Why Do I Need Security?
jailing the proxy
Chroot
passwords not encrypted
Require Proxy Authentication
proxy and SSL
What About SSL and the Proxy Server?
SSL and
What About SSL and the Proxy Server?
tracking user access
Access Log File
types of
Why Do I Need Security?

server
manually starting
Starting and Stopping the Server Manually
manually stopping
Starting and Stopping the Server Manually
network disconnecting
Connecting To and Disconnecting From the Network

server authentication
Why Do I Need Security?

server daemon
defined
Glossary

server name
aliases
Create an Alias for the Server
changing
Server Name
Create an Alias for the Server
CNAME and
Create an Alias for the Server

server processes
Server Processes

server root
defined
Glossary

server root directory
Server Root

server-push
Proxy Timeout

ServerName
magnus.conf directive
ServerName

servers
mirror
Mapping URLs to Mirror Servers
NameTrans

Service directive
obj.conf
Service

shell_cmd (SOCKD)
shell_cmd

SOCKD
SOCKD Logging

sockd.conf
structure of
Structure of sockd.conf

sockd.conf file
sockd.conf File

SOCKS
defined
Glossary
described
SOCKS Daemon Configuration
manually configuring
init-sockd
resources and
ObjectType
using to retrieve resources
Use SOCKS When Retrieving This Resource

SOCKS Daemon
configuration
SOCKS Daemon Configuration

soft restart
defined
Basic Server Configuration

Specifics
Technical Server Configuration
Basic Server Configuration

SSL
connect method
SSL Proxy Protocol: Technical Details
defined
What is SSL?
Glossary
Why Do I Need Security?
described
How Does SSL Work?
figure of data flow
What About SSL and the Proxy Server?
handshake
How Does SSL Work?
HTTPS
What is HTTPS?
HTTPS and
What About SSL and the Proxy Server?
misconfiguration
Configuring SSL proxying
Netscape Navigator and
What About SSL and the Proxy Server?
protocols and
Why Do I Need Security?
proxying
configuring
Configuring SSL proxying
proxying with
What About SSL and the Proxy Server?
TCP/IP and
How Does SSL Work?
technical details of
SSL Proxy Protocol: Technical Details

stale data
Remote Server Unavailable

standards, SSL and
What is SSL?

starting the proxy
user account needed
Proxy Server User
Choose a Unique Port Number

starting the server
from the command line
Starting and Stopping the Server Manually

stopping the server
from the command line
Starting and Stopping the Server Manually

superuser
Create an IRIX User Account
Starting and Stopping the Server Manually
Starting and Stopping the Server Manually
defined
Glossary

system user account
Create an IRIX User Account
Create an IRIX User Account
non-privileged
Create an IRIX User Account

table of processes
Server Processes

telnet
Glossary

telnet hopping, security risk
Configuring SSL proxying

timeout
Proxy Timeout
large documents and
Cache Lock Timeout

top-level domain authority
Glossary

transfer time of documents
Interpreting the pstats Output

uid
defined
Glossary

Unix
jailing the proxy
Chroot
user accounts
Proxy Server User

Unix user account
specifying
User

up-to-date check
Cache Expiration Setting

up-to-date checks
Cache Refresh Setting
described
Is a Document Up to Date?
figure of
How Caching Works

URL
defined
Glossary

URL database
defined
Glossary
repairing
Repairing the Cache URL Database

URLs
as resources in the proxy
Using the Resource Manager
cache and
How Caching Works
caching
Inhibit/Enable Caching of This Resource
configuring proxy and
Using the Resource Manager
editing mappings to mirror servers
Editing Existing Mappings
mapping to mirror servers
Mapping URLs to Mirror Servers
mapping to mirror sites
NameTrans
restricting access to
Control Access to This Resource Through This Proxy
setting options for
Using the Resource Manager
viewing in cache
Using the Cache Manager

User
magnus.conf directive
User

user accounts
nobody
Proxy Server User
proxy and
Proxy Server User

user authentication
defined
Require Proxy Authentication
text seen when authenticating
Require Proxy Authentication

user databases
access control and
Require Proxy Authentication
adding users
user databases:editing
Adding, Editing, and Removing Users in a Database
converting NCSA databases
Converting an NCSA or Text File to a User Database
creating
Creating a User Database
defined
User Databases
removing
Removing an Existing Database
removing users from
Adding, Editing, and Removing Users in a Database

userlist (SOCKD)
userlist

users, tracking
Access Log File

view error log
The Error Log File

wildcard patterns
defined
Understanding Wildcard Patterns
examples of
Understanding Wildcard Patterns
resource examples of
Choosing a Resource to Configure
resources
examples of
Choosing a Resource to Configure
resources and
Using the Resource Manager

~
in wildcards
Understanding Wildcard Patterns