That is VERY similar to the way that the WCCP module works when it is
integrated with a Cisco Gateway using WCCP.
Jay Wilson
Internet Engineering Manager
Access L.L.C.
HIGH SPEED INTERNET ACCESS FOR BUSINESS
7518 Enterprise Avenue
Germantown, TN. 38138-3802
(901) 869-8001
-----Original Message-----
From: Miguel A.L. Paraz [mailto:map@iphil.net]
Sent: Saturday, January 08, 2000 5:14 PM
To: squid-users@ircache.net
Subject: IDEA: Stealth Cache
Hi,
I have an idea to improve on the concept of transparent caching, please
feel free to comment or shoot it down.
Plug a your favorite Unix-alike machine into your hub or into a switch port
that can hear all traffic. Run something like tcpdump in write-to-file
mode.
Capture HTTP connections between non-cache machines and origin servers.
If we have a complete session from end-to-end, save it and "push" it into
your Squid.
The advantage is that clients who go direct can, but their traffic is copied
for the benefit of those who use the cache. If the stealth box goes down
nothing happens.
Problem: How can you be sure that the session you capture is complete and
not
corrupt? Rely on the TCP control information?
Thanks for your suggestions.
Cheers,
---m
-- Miguel "Migs" A.L. Paraz IPhil Communications Network, Inc. http://www.iphil.net Business Development/Network Architecture/Training 5/F 116 Herrera St., Legaspi Village, Makati City, Philippines +63-2-750-2288Received on Sat Jan 08 2000 - 21:50:52 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 16:50:17 MST