I have been trying to get tinyproxy to work for a few days now. Can
someone shed some light on what I am doing wrong. I keep getting page
not found. I have setup my browser to use the proxy at 192.168.66.1:8888
which is the net interface for the LRP box. I am using the latest Bering
with TinyProxy 1.51.

I have setup the following policy:

fw              all             ACCEPT

and the following rule:

ACCEPT    net:192.168.68.1/32 \
                         fw             tcp       8888

TIA

The tinyproxy.conf :
##

## tinyproxy.conf -- tinyproxy daemon configuration file

##

#

# Name of the user the tinyproxy daemon should switch to after the port

# has been bound.

#

User nobody

Group nogroup

#

# Port to listen on.

#

Port 8888

#

# If you have multiple interfaces this allows you to bind to only one.
If

# this is commented out, tinyproxy will bind to all interfaces present.

#

#Listen 192.168.0.1

#

# The Bind directive allows you to bind the outgoing connections to a

# particular IP address.

#

#Bind 192.168.0.1

#

# Timeout: The number of seconds of inactivity a connection is allowed
to

# have before it closed by tinyproxy.

#

Timeout 600

#

# Where to log the information. Either LogFile or Syslog should be set,

# but not both.

#

Logfile "/var/log/tinyproxy.log"

# Syslog On

#

# Set the logging level. Allowed settings are:

# Critical (least verbose)

# Error

# Warning

# Notice

# Connect (to log connections without Info's noise)

# Info (most verbose)

# The LogLevel logs from the set level and above. For example, if the
LogLevel

# was set to Warning, than all log messages from Warning to Critical
would be

# output, but Notice and below would be suppressed.

#

LogLevel Info

#

# PidFile: Write the PID of the main tinyproxy thread to this file so it

# can be used for signalling purposes.

#

PidFile "/var/run/tinyproxy.pid"

#

# Include the X-Tinyproxy header, which has the client's IP address when

# connecting to the sites listed.

#

#XTinyproxy mydomain.com

#

# Turns tinyproxy into a TCP tunnel which connects the local computer on

# 'Port' to the remote computer's port. No processing is done when using

# tinyproxy as a tunnel. If you want to connect to an upstream proxy use

# the "Upstream" directive below.

#

#Tunnel some.remote.computer:port

#

# Turns on upstream proxy support.

#

#Upstream some.remote.proxy:port

#

# This is the absolute highest number of threads which will be created.
In

# other words, only MaxClients number of clients can be connected at the

# same time.

#

MaxClients 100

#

# These settings set the upper and lower limit for the number of

# spare servers which should be available. If the number of spare
servers

# falls below MinSpareServers then new ones will be created. If the
number

# of servers exceeds MaxSpareServers then the extras will be killed off.

#

MinSpareServers 5

MaxSpareServers 20

#

# Number of servers to start initially.

#

StartServers 10

#

# MaxRequestsPerChild is the number of connections a thread will handle

# before it is killed. In practise this should be set to 0, which
disables

# thread reaping. If you do notice problems with memory leakage, then
set

# this to something like 10000

#

MaxRequestsPerChild 0

#

# The following is the authorization controls. If there are any access

# control keywords then the default action is to DENY. Otherwise, the

# default action is ALLOW.

#

# Also the order of the controls are important. The incoming connections

# are tested against the controls based on order.

#

Allow 127.0.0.1

Allow 192.168.68.0/25

#

# The location of the filter file.

#

#Filter "/etc/tinyproxy/filter"

#

# Filter based on URLs rather than domains.

#

#FilterURLs On

#

# Use POSIX Extended regular expressions rather than basic.

#

#FilterExtended On

#

# Change the default policy of the filtering system. If this directive
is

# commented out, or is set to "No" then the default policy is to allow
everything

# which is not specifically denied by the filter file.

#

# However, by setting this directive to "Yes" the default policy becomes
to

# deny everything which is _not_ specifically allowed by the filter
file.

#

#FilterDefaultDeny Yes

#

# If an Anonymous keyword is present, then anonymous proxying is
enabled.

# The headers listed are allowed through, while all others are denied.
If

# no Anonymous keyword is present, then all header are allowed through.

# You must include quotes around the headers.

#

#Anonymous "Host"

#Anonymous "Authorization"

#

# This is a list of ports allowed by tinyproxy when the CONNECT method

# is used. To disable the CONNECT method altogether, set the value to 0.

# If no ConnectPort line is found, all ports are allowed (which is not

# very secure.)

#

# The following two ports are used by SSL.

#

ConnectPort 443

ConnectPort 563




-------------------------------------------------------
This SF.Net email sponsored by: ApacheCon 2003,
16-19 November in Las Vegas. Learn firsthand the latest
developments in Apache, PHP, Perl, XML, Java, MySQL,
WebDAV, and more! http://www.apachecon.com/
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to