Pessoal, descobri o erro. O que estava acontecendo e estou achando estranho e que sempre que adiciono alguma regra o msn para de funcionar e para que funcione novamente tenho que restartar o servico de rede... Alguem ja passou por isso? e norma?
----- Mensagem original ---- De: Paulo Ferreira <[EMAIL PROTECTED]> Para: debian-user-portuguese@lists.debian.org Enviadas: Domingo, 28 de Setembro de 2008 14:49:48 Assunto: Problemas de conexao iptables msn Boa tarde pessoal, Estou usando debian etch como firewall+proxy transparent e o problema e que o msn nao conecta. O interessante e que quando restarto as interfaces com o comando /etc/init.d/network restart e aplico a regra: iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to 3128 ele funciona normal mais quando eu aplico as regras abaixo nao funciona mais e nao aparece nada nos logs de bloqueio. O que estou sera que tem de errado? Segue minhas regras e meu squid.conf minha rede interna e 10.23.118.0/24 e estou usando adsl ( velox ) como brigde. Desde ja agradeco. #!/bin/bash IPTABLES=/sbin/iptables MODPROBE=/sbin/modprobe echo "1" > /proc/sys/net/ipv4/ip_forward $IPTABLES -F $IPTABLES -t nat -F $IPTABLES -t mangle -F ####################################################### ## POLITICAS ## ####################################################### $MODPROBE iptable_nat $MODPROBE iptable_filter $MODPROBE iptable_mangle $MODPROBE ip_nat_ftp $MODPROBE ip_conntrack_ftp $MODPROBE ipt_MASQUERADE $MODPROBE ipt_REDIRECT ####################################################### ## POLITICAS ## ####################################################### $IPTABLES -P INPUT DROP $IPTABLES -P OUTPUT DROP $IPTABLES -P FORWARD DROP ####################################################### ## REGRAS INPUT ## ####################################################### # PERMITE INTERFACE LOOPBACK $IPTABLES -A INPUT -i lo -j ACCEPT # PERMITE ACESSO A INTERNET DO FIREWALL $IPTABLES -A INPUT -p tcp -m multiport --sport 80,443,20,21 -j ACCEPT # PERMITE ACESSO A INTERNET DO FIREWALL $IPTABLES -A INPUT -p udp --sport 53 -j ACCEPT # PERMITE ATUALIZACAO DINAMICA NO-IP $IPTABLES -A INPUT -p tcp --sport 8245 -j ACCEPT # PERMITE RESOLUCAO NOMES DNS $IPTABLES -A INPUT -p udp -s 10.23.118.0/24 --dport 53 -j ACCEPT # PERMITE ACESSO AO PROXY $IPTABLES -A INPUT -p tcp -s 10.23.118.0/24 --dport 3128 -j ACCEPT # PERMITE ACESSO AO MSN $IPTABLES -A INPUT -p tcp -s 10.23.118.0/24 --dport 1863 -j ACCEPT # TRAFEGO REDE EXTERNA $IPTABLES -A INPUT -p tcp -i ppp+ -j ACCEPT # PERMITE SSH $IPTABLES -A INPUT -p tcp --dport 22 -j ACCEPT # PERMITE ICMP $IPTABLES -A INPUT -p icmp -j ACCEPT # LOG $IPTABLES -A INPUT -j LOG --log-prefix "BLOQUEIO INPUT " ####################################################### ## REGRAS OUTPUT ## ####################################################### # PERMITE TODO TRAFEGO LOCAL PARA QUALQUER DESTINO $IPTABLES -A OUTPUT -j ACCEPT # PERMITE ATUALIZACAO DINAMICA NO-IP $IPTABLES -A OUTPUT -p tcp --dport 8245 -j ACCEPT # LOG $IPTABLES -A OUTPUT -j LOG --log-prefix "BLOQUEIO OUTPUT " ####################################################### ## NAT ## ####################################################### # REGRA DIRECIONAMENTO DEMAIS CONEXOES $IPTABLES -t nat -A POSTROUTING -s 10.23.118.0/24 -o ppp0 -j MASQUERADE # PROXY TRANSPARENTE $IPTABLES -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to 3128 ####################################################### ## REGRAS FORWARD ## ####################################################### # NEGA MSN # REGRAS ACESSO REDE INTERNA $IPTABLES -A FORWARD -p tcp -s 10.23.118.0/24 -j ACCEPT $IPTABLES -A FORWARD -p tcp -d 10.23.118.0/24 -j ACCEPT # LOG $IPTABLES -A FORWARD -j LOG --log-prefix "BLOQUEIO FORWARD " http_port 3128 transparent hierarchy_stoplist cgi-bin ? acl QUERY urlpath_regex cgi-bin \? cache deny QUERY acl apache rep_header Server ^Apache broken_vary_encoding allow apache access_log /var/log/squid/access.log squid hosts_file /etc/hosts refresh_pattern ^ftp: 1440 20% 10080 refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern . 0 20% 4320 acl all src 0.0.0.0/0.0.0.0 #acl PALAVRAS_BLOQUEADAS url_regex -i "/etc/squid/regras/PALAVRAS_BLOQUEADAS.txt" acl manager proto cache_object acl LOCAL src 10.23.118.0/24 acl localhost src 127.0.0.1/255.255.255.255 acl to_localhost dst 127.0.0.0/8 acl SSL_ports port 443 # https acl SSL_ports port 563 # snews acl SSL_ports port 873 # rsync acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 # https acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http acl Safe_ports port 631 # cups acl Safe_ports port 873 # rsync acl Safe_ports port 901 # SWAT acl purge method PURGE acl CONNECT method CONNECT http_access allow manager localhost http_access deny manager http_access allow purge localhost http_access deny purge http_access deny !Safe_ports http_access deny CONNECT !SSL_ports #http_access deny PALAVRAS_BLOQUEADAS http_access allow localhost http_access allow LOCAL http_access deny all http_reply_access allow all icp_access allow all cache_effective_group proxy coredump_dir /var/spool/squid Novos endereços, o Yahoo! que você conhece. Crie um email novo com a sua cara @ymail.com ou @rocketmail.com. http://br.new.mail.yahoo.com/addresses