[squid-users] Non respect fo Proxy chain

2006-02-06 Thread Gix, Lilian \(CI/OSR\) *

Hello,

It's not the first time I ask for this, but I didn't see any answer.

I have two proxies. They have Ips 10.105.x.y and 10.105.x.y+1
The outgoing is an upstream proxy.

My problem is: They try to reach by themselves URL with: 192.168.*.*
instead of forward them to the Upstream proxy.


1139206331.003 179161 10.104.x.* TCP_MISS/504 1490 GET
http://192.168.37.10/icons/parent.gif - NONE/- text/html
1139206331.003 179123 10.104.x.* TCP_MISS/504 1492 GET
http://192.168.37.10/icons/archive.gif - NONE/- text/html
1139206331.003 179119 10.104.x.* TCP_MISS/504 1486 GET
http://192.168.37.10/icons/text.gif - NONE/- text/html
1139206331.003 179119 10.104.x.* TCP_MISS/504 1492 GET
http://192.168.37.10/icons/unknown.gif - NONE/- text/html


I really need a solution.

Thanks.
Gix Lilian


Re: [squid-users] Non respect fo Proxy chain

2006-02-06 Thread Mark Elsen

 Hello,

 It's not the first time I ask for this, but I didn't see any answer.

 I have two proxies. They have Ips 10.105.x.y and 10.105.x.y+1
 The outgoing is an upstream proxy.

 My problem is: They try to reach by themselves URL with: 192.168.*.*
 instead of forward them to the Upstream proxy.


 1139206331.003 179161 10.104.x.* TCP_MISS/504 1490 GET
 http://192.168.37.10/icons/parent.gif - NONE/- text/html
 1139206331.003 179123 10.104.x.* TCP_MISS/504 1492 GET
 http://192.168.37.10/icons/archive.gif - NONE/- text/html
 1139206331.003 179119 10.104.x.* TCP_MISS/504 1486 GET
 http://192.168.37.10/icons/text.gif - NONE/- text/html
 1139206331.003 179119 10.104.x.* TCP_MISS/504 1492 GET
 http://192.168.37.10/icons/unknown.gif - NONE/- text/html



  http://www.squid-cache.org/Doc/FAQ/FAQ-4.html#ss4.8

 M.


RE: [squid-users] Non respect fo Proxy chain

2006-02-06 Thread Gix, Lilian \(CI/OSR\) *
Thanks for your help:

Here is my Configuration regarding direct access:

always_direct deny Firm1_Sites_Internet
always_direct deny Firm2_Sites_Internet
always_direct allow Firm1_Sites_Intranet
always_direct allow Firm2_Sites_Intranet
always_direct allow Intern
always_direct deny all

never_direct allow all

Gix Lilian

-Original Message-
From: Mark Elsen [mailto:[EMAIL PROTECTED] 
Sent: Montag, 6. Februar 2006 10:07
To: Gix, Lilian (CI/OSR) *
Cc: squid-users@squid-cache.org
Subject: Re: [squid-users] Non respect fo Proxy chain


 Hello,

 It's not the first time I ask for this, but I didn't see any answer.

 I have two proxies. They have Ips 10.105.x.y and 10.105.x.y+1
 The outgoing is an upstream proxy.

 My problem is: They try to reach by themselves URL with: 192.168.*.*
 instead of forward them to the Upstream proxy.


 1139206331.003 179161 10.104.x.* TCP_MISS/504 1490 GET
 http://192.168.37.10/icons/parent.gif - NONE/- text/html
 1139206331.003 179123 10.104.x.* TCP_MISS/504 1492 GET
 http://192.168.37.10/icons/archive.gif - NONE/- text/html
 1139206331.003 179119 10.104.x.* TCP_MISS/504 1486 GET
 http://192.168.37.10/icons/text.gif - NONE/- text/html
 1139206331.003 179119 10.104.x.* TCP_MISS/504 1492 GET
 http://192.168.37.10/icons/unknown.gif - NONE/- text/html



  http://www.squid-cache.org/Doc/FAQ/FAQ-4.html#ss4.8

 M.



[squid-users] Non-blocking redirectors

2006-02-06 Thread Andrew Pantyukhin
It's really weird that squid, with all its non-blocking
nature, still 'blocks' on redirectors I/O. This effectively
prevents us from writing non-blocking or multi-threaded
redirectors (well, not without some hardcore apache-
style non-portable mess with file descriptors).

Is it so hard to send a sernum with each request and
have the redirector return it to match against pending
redirections?


Re: [squid-users] Non respect fo Proxy chain

2006-02-06 Thread Mark Elsen
  
 Here is my Configuration regarding direct access:

 always_direct deny Firm1_Sites_Internet
 always_direct deny Firm2_Sites_Internet
 always_direct allow Firm1_Sites_Intranet
 always_direct allow Firm2_Sites_Intranet
 always_direct allow Intern
 always_direct deny all

 never_direct allow all



   Try removing :

 always_direct deny all

 M.


RE: [squid-users] HTTPS traffic not being forwarded to upstream proxy.

2006-02-06 Thread Paul Murphy


-Original Message-
From: Chris Robertson [mailto:[EMAIL PROTECTED]
Sent: 01 February 2006 20:19
To: squid-users@squid-cache.org
Subject: RE: [squid-users] HTTPS traffic not being forwarded to upstream
proxy.

 -Original Message-
 From: squid user [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, February 01, 2006 7:27 AM
 To: [EMAIL PROTECTED]
 Cc: squid-users@squid-cache.org
 Subject: Re: [squid-users] HTTPS traffic not being forwarded
 to upstream
 proxy.

 On 2/1/06, squid user [EMAIL PROTECTED] wrote:
   Hi,
  
   I have a Squid 2.5 stable 11 proxy forwarding traffic to
   an upstream proxy
   based on domain. This works fine for HTTP traffic, but
   HTTPS traffic is
   flowing directly from the downstream proxy to the internet.
  
   Would anyone give me any pointers as to an access list or
   other strategy I
   can use to ensure that HTTPS traffic flows to the
   upstream proxy? Here's
   what I have at the moment...
  
   acl forwardTraffic dstdomain .co.uk
   cache_peer 172.21.118.118 parent 3128 0 proxy-only no-query
   cache_peer_access 172.21.118.118 allow forwardTraffic
 
 
 Try changing the above line into :
 
never_direct allow forwardTraffic
 
   cache_peer_access 172.21.118.118 deny all
  

Not such a good idea.  Now you are saying that .co.uk can't go direct
(fine) but that no requests can use the cache_peer (whoops).  Hence the
problem seen below...

 
   M.


 Hi Mark,

 Thanks for getting back to me, but unfortunately that didn't work.

 On the browser I see:

 The following error was encountered:

 * Unable to forward this request at this time.

 This request could not be forwarded to the origin server or
 to any parent
 caches. The most likely cause for this error is that:

 * The cache administrator does not allow this cache to
 make direct
 connections to origin servers, and
 * All configured parent caches are currently unreachable.

 And in the squid log I see, using ebay.co.uk for example...

 Failed to select source for 'http://www.ebay.co.uk'
 always_direct = 0
 never_direct = 1
 timed_out = 0

 Cheers

 SU



I'd say either add the never_direct line to what you have
(cache_peer_access) or get rid of the cache_peer_access lines, and ONLY
have the never_direct.  Otherwise, if you want to direct ALL ssl traffic
through your parent cache, cache_peer_access 172.21.118.118 allow
CONNECT will do it.

Chris

Hi all,

Sorry about starting this up again, but I wasn't around my computer for
the latter part of last week.

Anyway, I tried adding the 'never_direct' line alongside my
cache_peer_access configuration and it still failed to work. HTTPS traffic
went direct from the first proxy to the outside world. I installed squid
STABLE12 and it happened with that release also.

As directing all ssl traffic to the upstream proxy isn't an option, any
other ideas would be greatly appreciated!

Cheers

SU


smime.p7s
Description: S/MIME cryptographic signature


[squid-users] access.log with user from ntlm?

2006-02-06 Thread Gunnar Groetschel
Hi List

I have installed the squid with ntlm authentication and everything is
working fine.

But how can I see the authenticated user in the access.log file. I only
see his IP-Address?

Best regards
Gunnar



RE: [squid-users] Squid and iptables - need help

2006-02-06 Thread Chris Robertson
Hi...

 -Original Message-
 From: Gregori Parker [mailto:[EMAIL PROTECTED]
 Sent: Friday, February 03, 2006 10:25 AM
 To: squid-users@squid-cache.org
 Subject: [squid-users] Squid and iptables - need help
 
 
 I have just deployed a cluster of squid caching servers in 
 reverse proxy
 mode, and am having trouble with iptables.  When iptables is 
 turned on,
 I can hit the caching servers, but squid times out trying to pull from
 the origin servers (in our other datacenters).
 
 I'm thinking that if I add outgoing rules for our other datacenters,
 everything should be fine, but they are now in production and I cant
 simply test at will...I'm planning on adding these lines, can anyone
 tell me if this will fix my timeout problem when squid tries to pull
 from the origin servers?  I'm green on iptables configuration, so any
 advice in general is welcome!  Sorry for the long email, and 
 thank you!
 
 Lines I plan to add:
 
 # Allow anything *to* our various datacenters
 $IPTABLES -A OUTPUT -d XX.XX.XXX.XXX/26 -p all -j ACCEPT
 $IPTABLES -A OUTPUT -d XX.XX1.XXX.X/26 -p all -j ACCEPT
 $IPTABLES -A OUTPUT -d XX.XX.XX.X/26 -p all -j ACCEPT
 

Replace. Don't add...

 
 Or maybe I can just add this instead:
 
 $IPTABLES -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
 

This would be the same thing as $IPTABLES --policy OUTPUT ALLOW.

 
 Here's the current iptables script:
 --
 --
 -
 #!/bin/sh
 
 LAN=eth1
 INTERNET=eth0
 IPTABLES=/sbin/iptables
 
 # Drop ICMP echo-request messages sent to broadcast or multicast
 addresses
 echo 1  /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
 
 # Drop source routed packets
 echo 0  /proc/sys/net/ipv4/conf/all/accept_source_route
 
 # Enable TCP SYN cookie protection from SYN floods
 echo 1  /proc/sys/net/ipv4/tcp_syncookies
 
 # Don't accept ICMP redirect messages
 echo 0  /proc/sys/net/ipv4/conf/all/accept_redirects
 
 # Don't send ICMP redirect messages
 echo 0  /proc/sys/net/ipv4/conf/all/send_redirects
 
 # Enable source address spoofing protection
 echo 1  /proc/sys/net/ipv4/conf/all/rp_filter
 
 # Log packets with impossible source addresses
 echo 1  /proc/sys/net/ipv4/conf/all/log_martians
 
 # Flush all chains
 $IPTABLES --flush
 
 # Allow unlimited traffic on the loopback interface
 $IPTABLES -A INPUT -i lo -j ACCEPT
 $IPTABLES -A OUTPUT -o lo -j ACCEPT
 
 # Set default policies
 $IPTABLES --policy INPUT DROP
 $IPTABLES --policy OUTPUT DROP
 $IPTABLES --policy FORWARD DROP
 
 # Previously initiated and accepted exchanges bypass rule checking
 $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
 $IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
 

Change these lines...

 # Allow anything from our various datacenters
 $IPTABLES -A INPUT -s XX.XX.XXX.XXX/26 -p all -j ACCEPT
 $IPTABLES -A INPUT -s XX.XX1.XXX.X/26 -p all -j ACCEPT
 $IPTABLES -A INPUT -s XX.XX.XX.X/26 -p all -j ACCEPT
 

...to...

# Allow anything from our various datacenters
$IPTABLES -A OUPUT -d XX.XX.XXX.XXX/26 -p all -j ACCEPT
$IPTABLES -A OUPUT -d XX.XX1.XXX.X/26 -p all -j ACCEPT
$IPTABLES -A OUPUT -d XX.XX.XXX.X/26 -p all -j ACCEPT

... and Squid will be able to query your datacenters.  Responses will be 
allowed by the --state ESTABLISHED,RELATED rule.  It would probably be a good 
idea to make this rule a bit more stringent (only allow TCP on port 80, or 
what-have-you).  But it's a good start.

 # Allow incoming port 22 (ssh) connections on external interface
 $IPTABLES -A INPUT -i $INTERNET -p tcp --destination-port 22 
 -m state \
 --state NEW -j ACCEPT
 

I'd REALLY strongly recommend you limit which hosts can connect to port 22.  
There are no shortage of SSH scanners in the wild.

 # Allow incoming port 4827 (squid-htcp) connections on external
 interface
 $IPTABLES -A INPUT -i $INTERNET -p tcp --destination-port 
 4827 -m state
 \
 --state NEW -j ACCEPT
 
 # Allow incoming port 80 (http) connections on external interface
 $IPTABLES -A INPUT -i $INTERNET -p tcp --destination-port 80 
 -m state \
 --state NEW -j ACCEPT
 
 # Allow ICMP ECHO REQUESTS
 $IPTABLES -A INPUT -i $INTERNET -p icmp --icmp-type echo-request -j
 ACCEPT
 $IPTABLES -A INPUT -p icmp -j ACCEPT
 $IPTABLES -A OUTPUT -p icmp -j ACCEPT
 
 
 # Allow DNS resolution
 $IPTABLES -A OUTPUT -o $INTERNET -p udp --destination-port 53 
 -m state \
 --state NEW -j ACCEPT
 $IPTABLES -A OUTPUT -o $INTERNET -p tcp --destination-port 53 
 -m state \
 --state NEW -j ACCEPT
 
 # Allow ntp synchronization
 $IPTABLES -A OUTPUT -o $INTERNET -p udp --destination-port 
 123 -m state
 \
 --state NEW -j ACCEPT
 
 # allow anything on the trusted interface
 $IPTABLES -A INPUT -i $LAN -p all -j ACCEPT
 $IPTABLES -A OUTPUT -o $LAN -p all -j ACCEPT
 
 # Have these rules take effect when iptables is started
 /sbin/service iptables save
 
 --
 
 

Chris


Re: [squid-users] access.log with user from ntlm?

2006-02-06 Thread Kinkie
On Mon, 2006-02-06 at 17:09 +0100, Gunnar Groetschel wrote:
 Hi List
 
 I have installed the squid with ntlm authentication and everything is
 working fine.
 
 But how can I see the authenticated user in the access.log file. I only
 see his IP-Address?

You're probably not really authenticating users then, usernames would
get logged there otherwise.

Can you double-check your acl lines?

Kinkie


RE: [squid-users] HTTPS traffic not being forwarded to upstream proxy.

2006-02-06 Thread Chris Robertson
 -Original Message-
 From: Paul Murphy [mailto:[EMAIL PROTECTED]
 Sent: Monday, February 06, 2006 6:55 AM
 To: Chris Robertson; squid-users@squid-cache.org
 Subject: RE: [squid-users] HTTPS traffic not being forwarded 
 to upstream
 proxy.
 
 
 Hi all,
 
 Sorry about starting this up again, but I wasn't around my 
 computer for
 the latter part of last week.
 
 Anyway, I tried adding the 'never_direct' line alongside my
 cache_peer_access configuration and it still failed to work. 
 HTTPS traffic
 went direct from the first proxy to the outside world. I 
 installed squid
 STABLE12 and it happened with that release also.


Then there has to be something wrong with the never_direct line.  You might try 
modifying your debug options 
(http://www.squid-cache.org/Doc/FAQ/FAQ-10.html#acl-debug) to see if that gives 
any hints.
 
 As directing all ssl traffic to the upstream proxy isn't an 
 option, any
 other ideas would be greatly appreciated!
 
 Cheers
 
 SU
 

Chris


RE: [squid-users] Squid and iptables - need help

2006-02-06 Thread Gregori Parker
Thanks Chris, I got rid of a lot of redundancy and replaced general
rules much more specific ones (e.g. SSH et al have source/destination ip
space constraints)...everything seems to be working fine now!


-Original Message-
From: Chris Robertson [mailto:[EMAIL PROTECTED] 
Sent: Monday, February 06, 2006 10:59 AM
To: squid-users@squid-cache.org
Subject: RE: [squid-users] Squid and iptables - need help

Hi...

 -Original Message-
 From: Gregori Parker [mailto:[EMAIL PROTECTED]
 Sent: Friday, February 03, 2006 10:25 AM
 To: squid-users@squid-cache.org
 Subject: [squid-users] Squid and iptables - need help
 
 
 I have just deployed a cluster of squid caching servers in 
 reverse proxy
 mode, and am having trouble with iptables.  When iptables is 
 turned on,
 I can hit the caching servers, but squid times out trying to pull from
 the origin servers (in our other datacenters).
 
 I'm thinking that if I add outgoing rules for our other datacenters,
 everything should be fine, but they are now in production and I cant
 simply test at will...I'm planning on adding these lines, can anyone
 tell me if this will fix my timeout problem when squid tries to pull
 from the origin servers?  I'm green on iptables configuration, so any
 advice in general is welcome!  Sorry for the long email, and 
 thank you!
 
 Lines I plan to add:
 
 # Allow anything *to* our various datacenters
 $IPTABLES -A OUTPUT -d XX.XX.XXX.XXX/26 -p all -j ACCEPT
 $IPTABLES -A OUTPUT -d XX.XX1.XXX.X/26 -p all -j ACCEPT
 $IPTABLES -A OUTPUT -d XX.XX.XX.X/26 -p all -j ACCEPT
 

Replace. Don't add...

 
 Or maybe I can just add this instead:
 
 $IPTABLES -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
 

This would be the same thing as $IPTABLES --policy OUTPUT ALLOW.

 
 Here's the current iptables script:
 --
 --
 -
 #!/bin/sh
 
 LAN=eth1
 INTERNET=eth0
 IPTABLES=/sbin/iptables
 
 # Drop ICMP echo-request messages sent to broadcast or multicast
 addresses
 echo 1  /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
 
 # Drop source routed packets
 echo 0  /proc/sys/net/ipv4/conf/all/accept_source_route
 
 # Enable TCP SYN cookie protection from SYN floods
 echo 1  /proc/sys/net/ipv4/tcp_syncookies
 
 # Don't accept ICMP redirect messages
 echo 0  /proc/sys/net/ipv4/conf/all/accept_redirects
 
 # Don't send ICMP redirect messages
 echo 0  /proc/sys/net/ipv4/conf/all/send_redirects
 
 # Enable source address spoofing protection
 echo 1  /proc/sys/net/ipv4/conf/all/rp_filter
 
 # Log packets with impossible source addresses
 echo 1  /proc/sys/net/ipv4/conf/all/log_martians
 
 # Flush all chains
 $IPTABLES --flush
 
 # Allow unlimited traffic on the loopback interface
 $IPTABLES -A INPUT -i lo -j ACCEPT
 $IPTABLES -A OUTPUT -o lo -j ACCEPT
 
 # Set default policies
 $IPTABLES --policy INPUT DROP
 $IPTABLES --policy OUTPUT DROP
 $IPTABLES --policy FORWARD DROP
 
 # Previously initiated and accepted exchanges bypass rule checking
 $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
 $IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
 

Change these lines...

 # Allow anything from our various datacenters
 $IPTABLES -A INPUT -s XX.XX.XXX.XXX/26 -p all -j ACCEPT
 $IPTABLES -A INPUT -s XX.XX1.XXX.X/26 -p all -j ACCEPT
 $IPTABLES -A INPUT -s XX.XX.XX.X/26 -p all -j ACCEPT
 

...to...

# Allow anything from our various datacenters
$IPTABLES -A OUPUT -d XX.XX.XXX.XXX/26 -p all -j ACCEPT
$IPTABLES -A OUPUT -d XX.XX1.XXX.X/26 -p all -j ACCEPT
$IPTABLES -A OUPUT -d XX.XX.XXX.X/26 -p all -j ACCEPT

... and Squid will be able to query your datacenters.  Responses will be
allowed by the --state ESTABLISHED,RELATED rule.  It would probably be
a good idea to make this rule a bit more stringent (only allow TCP on
port 80, or what-have-you).  But it's a good start.

 # Allow incoming port 22 (ssh) connections on external interface
 $IPTABLES -A INPUT -i $INTERNET -p tcp --destination-port 22 
 -m state \
 --state NEW -j ACCEPT
 

I'd REALLY strongly recommend you limit which hosts can connect to port
22.  There are no shortage of SSH scanners in the wild.

 # Allow incoming port 4827 (squid-htcp) connections on external
 interface
 $IPTABLES -A INPUT -i $INTERNET -p tcp --destination-port 
 4827 -m state
 \
 --state NEW -j ACCEPT
 
 # Allow incoming port 80 (http) connections on external interface
 $IPTABLES -A INPUT -i $INTERNET -p tcp --destination-port 80 
 -m state \
 --state NEW -j ACCEPT
 
 # Allow ICMP ECHO REQUESTS
 $IPTABLES -A INPUT -i $INTERNET -p icmp --icmp-type echo-request -j
 ACCEPT
 $IPTABLES -A INPUT -p icmp -j ACCEPT
 $IPTABLES -A OUTPUT -p icmp -j ACCEPT
 
 
 # Allow DNS resolution
 $IPTABLES -A OUTPUT -o $INTERNET -p udp --destination-port 53 
 -m state \
 --state NEW -j ACCEPT
 $IPTABLES -A OUTPUT -o $INTERNET -p tcp --destination-port 53 
 -m state \
 --state NEW -j ACCEPT
 
 # Allow ntp synchronization
 $IPTABLES -A OUTPUT -o 

[squid-users] Custom error to display login name of authenticated user?

2006-02-06 Thread Steve Kendall
Hi all,

Is there a way to display the login name of the authenticated user in a
custom error? I am using Squid 2.9.17 with Samba authentication.

Regards,

Steve.



[squid-users] error accessing ftp site

2006-02-06 Thread amit ash


Hi,

I have recently installed  configured squid proxy on suse 10. 
rest all is working fine but whenever i try to open any ftp site, 
it shows me this error: - An error occured while opening that 
folder on the ftp server. make sure you have permission to access 
that folder.

details:
200 switching to ASCII mode
500 illegal port command
500 unknown command
Please guide me and thanks in advance.

Amit Ash


Re: [squid-users] error accessing ftp site

2006-02-06 Thread Mark Elsen

 Hi,

 I have recently installed  configured squid proxy on suse 10.
 rest all is working fine but whenever i try to open any ftp site,
 it shows me this error: - An error occured while opening that
 folder on the ftp server. make sure you have permission to access
 that folder.
 details:
 200 switching to ASCII mode
 500 illegal port command
 500 unknown command
 Please guide me and thanks in advance.


  - How did you open the ftp site ?

  M.