[squid-users] block file download

2006-07-27 Thread amit ash


Hi everyone,

I was just searching on how to block file download through squid 
and got my hands on the code below. I implemented it on my linux 
server [suse 10 - squid 2.5] and it worked. I have read many 
querries in this forum regd this same issue so posting it for 
everyone.


Amit Ash


acl extndeny url_regex -i /etc/squid/extndeny
acl download method GET


http_access deny extndeny download
http_access deny extndeny[/code:1:81117a2bfd]
-save and close --

Now lets create extndeny file ..this is the list of file 
extensions which we are blocking in SQUID. make a file and add 
these file extensions vi /etc/squid/extndeny --

\.ez$
\.hqx$
\.cpt$
\.dot$
\.wrd$
\.bin$
\.dms$
\.lha$
\.lzh$
\.ace$
\.r00$
\.r01$
\.exe$
\.wp5$
\.wk$
\.wz$
\.vcd$
\.bz2$
\.deb$
\.dvi$
\.tar$
\.gtar$
\.tgz$
\.gz$
\.bat$
\.rpm$
\.spm$
\.zip$
\.mid$
\.midi$
\.kar$
\.mpga$
\.mp2$
\.mp3$
\.ra$
\.dl$
\.fli$
\.gl$
\.mpe$
\.mpeg$
\.mpg$
\.qt$
\.mov$
\.avi$
\.movie$
\.wav$
\.au$
\.asf$
\.af$
\.bin$
\.gz$
\.bz2$
\.asx$
\.afx$
\.asf$
\.asx$
\.au$
\.avi$
\.divx$
\.m3u$
\.mov$
\.mp2$
\.mp3$
\.mpeg$
\.mpg$
\.qt$
\.ra$
\.ram$
\.rm$
\.viv$
\.vivo$
\.vob$
\.vqf$
\.wav$
\.wma$
\.wmv$
\.vbs$
\.shs$
\.pif$
\.wpm$
\.wvx$

Now restart squid



[squid-users] how to allow only some users to access yahoo messenger

2006-03-14 Thread amit ash


Hi members,

I have squid 2.5 running on suse linux 10.0. my users login into 
their workstations through active directory on windows 2003 
server. Is there anyway i can allow or block users from accessing 
yahoo messenger specifically based on the username with which they 
have logged-in in their workstations.


Amit Ash


[squid-users] error accessing ftp site

2006-02-06 Thread amit ash


Hi,

I have recently installed  configured squid proxy on suse 10. 
rest all is working fine but whenever i try to open any ftp site, 
it shows me this error: - An error occured while opening that 
folder on the ftp server. make sure you have permission to access 
that folder.

details:
200 switching to ASCII mode
500 illegal port command
500 unknown command
Please guide me and thanks in advance.

Amit Ash


Re: [squid-users] NAT on suse linux 10.0

2006-01-25 Thread amit ash

Hi,

I made a new script file in /etc/init.d by the filename 
rc.ipmasq with the following script in it -


#!/bin/sh
IPTABLES=/sbin/iptables
$IPTABLES -F -t nat
$IPTABLES -A POSTROUTING -t nat -o eth0 -j MASQUERADE
echo 1  /proc/sys/net/ipv4/ip_forward
-

After this i ran the insserv rc.ipmasq command which gave no 
errors but still NAT wont work, it shows no output in the command 
iptables -L -t nat either. however it gives me this error msg 
when i type this command:-

linux:~ # /etc/init.d/rc.ipmasq
/etc/init.d/rc.ipmasq: line 2: IPTABLES: command not found
/etc/init.d/rc.ipmasq: line 3: -F: command not found
/etc/init.d/rc.ipmasq: line 4: -A: command not found

I am unable to understand, why it wont accept this code.

Amit Ash.

- Original Message -
From: Peter Albrecht [EMAIL PROTECTED]
To: squid-users@squid-cache.org
Sent: Wednesday, January 25, 2006 8:31 AM
Subject: Re: [squid-users] NAT on suse linux 10.0



Hi Amit,

 I have just installed and configured Squid proxy service on 
Suse
 Linux 10.0. It is working fine but I also need to configure 
NAT

 so
 that my users can download their emails in Outlook. To 
achieve

 that I have added these lines in the /etc/sysctl.conf

 net.ipv4.ip_forward=1
 iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
 iptables -I FORWARD -i eth1 -o eth0 -j ACCEPT

The last two lines will not work. /etc/sysctl.conf does not 
understand this
syntax (only the first of the lines you listed). Put the iptables 
rules in a
separate script in /etc/init.d/ and create the symbolic links in 
the
corresponding runlevel directories using insserv. A template for 
the script

is /etc/init.d/skeleton.

 But still the NAT doesnt work on this server. Please direct 
me

 and thanks in advance.

Check the settings for the NAT table using

iptables -L -t nat

Just iptables -L will not show your NAT settings.

Regards,

Peter

--
Peter Albrecht, Novell Training Services, 
[EMAIL PROTECTED]





[squid-users] NAT on suse linux 10.0

2006-01-24 Thread amit ash


Hi,

I have just installed and configured Squid proxy service on Suse 
Linux 10.0. It is working fine but I also need to configure NAT so 
that my users can download their emails in Outlook. To achieve 
that I have added these lines in the /etc/sysctl.conf


net.ipv4.ip_forward=1
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -I FORWARD -i eth1 -o eth0 -j ACCEPT

But still the NAT doesnt work on this server. Please direct me and 
thanks in advance.


Amit Ash


Re: [squid-users] NAT on suse linux 10.0

2006-01-24 Thread amit ash





On 24 Jan 2006 23:14:28 -, amit ash 
[EMAIL PROTECTED] wrote:


Hi,

I have just installed and configured Squid proxy service on Suse
Linux 10.0. It is working fine but I also need to configure NAT 
so

that my users can download their emails in Outlook. To achieve
that I have added these lines in the /etc/sysctl.conf

net.ipv4.ip_forward=1
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -I FORWARD -i eth1 -o eth0 -j ACCEPT

But still the NAT doesnt work on this server. Please direct me 
and

thanks in advance.

Amit Ash



What iptables -L -n says?

--
::DAMK::



I am attaching the output of the command in the txt file in this 
mail.


Amit.

Amit Ash
IT Dept.
Excel Infoways Pvt Ltd.

Work: +91-022-26394246
Fax:  +91-022-26394248
Cell: +91- 9892619518

Chain INPUT (policy DROP)
target prot opt source   destination
ACCEPT all  --  0.0.0.0/00.0.0.0/0
ACCEPT all  --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED
input_ext  all  --  0.0.0.0/00.0.0.0/0   policy match dir 
in pol ipsec proto 50
input_int  all  --  0.0.0.0/00.0.0.0/0
input_ext  all  --  0.0.0.0/00.0.0.0/0
input_ext  all  --  0.0.0.0/00.0.0.0/0
LOGall  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET '
DROP   all  --  0.0.0.0/00.0.0.0/0

Chain FORWARD (policy DROP)
target prot opt source   destination
TCPMSS tcp  --  0.0.0.0/00.0.0.0/0   tcp 
flags:0x06/0x02 TCPMSS clamp to PMTU
forward_ext  all  --  0.0.0.0/00.0.0.0/0   policy match dir 
in pol ipsec proto 50
forward_int  all  --  0.0.0.0/00.0.0.0/0
forward_ext  all  --  0.0.0.0/00.0.0.0/0
LOGall  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING '
DROP   all  --  0.0.0.0/00.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target prot opt source   destination
ACCEPT all  --  0.0.0.0/00.0.0.0/0
ACCEPT all  --  0.0.0.0/00.0.0.0/0   state 
NEW,RELATED,ESTABLISHED
LOGall  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR '

Chain forward_ext (2 references)
target prot opt source   destination
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 0
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 3
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 11
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 12
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 14
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 18
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 3 code 2
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 5
LOGtcp  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
LOGicmp --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
LOGudp  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT '
LOGall  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 state INVALID LOG flags 6 level 4 prefix `SFW2-FWDext-DROP-DEFLT-INV '
DROP   all  --  0.0.0.0/00.0.0.0/0

Chain forward_int (1 references)
target prot opt source   destination
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 0
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 3
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 11
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 12
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 14
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 18
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 3 code 2
ACCEPT icmp --  0.0.0.0/00.0.0.0/0   state 
RELATED,ESTABLISHED icmp type 5
LOGtcp  --  0.0.0.0/00.0.0.0/0   limit: avg 3/min 
burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-FWDint-DROP