Silamael wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Silamael wrote:
Amos Jeffries wrote:
This is usually a configuration problem.

Please provide your squid.conf file contents (minus empty and comment
lines)

Amos


No one has some idea what's wrong with our configuration?

Amos Jeffries wrote:
> This is usually a configuration problem.
> > Please provide your squid.conf file contents (minus empty and comment
> lines)
> > Amos

Hello Amos,

Here is our configuration.
Thank you for your help.

-- Matthias


Sorry, got a bit busy.

Here is a quick audit of your config...



#
# WARNING: Do not edit this file, it has been automatically generated.
#
# Prepends
append_domain .domain.de
unlinkd_program /usr/local/libexec/unlinkd
ipcache_high 95
icp_port 0
ipcache_size 1024
http_port 127.0.0.1:8000
cache_dir ufs /var/squid/cache/cache-8000 100MB 8 16
debug_options ALL,1
server_persistent_connections on
cache_swap_high 95
log_ip_on_direct off
maximum_object_size 20000 KB
minimum_direct_hops 4
udp_incoming_address 127.0.0.1
pid_filename /var/squid/logs/squid-8000.pid
ftp_user sq...@domain.de
forwarded_for off
cache_access_log /var/squid/logs/access-8000.log

The above is obsolete since 2.6.
Use access_log directive instead.

visible_hostname domaind193.domain.de
client_persistent_connections on
cache_swap_low 90
logfile_rotate 0
ipcache_low 90
cache_effective_user _squid
cache_log /var/squid/logs/cache-8000.log
cache_effective_group _squid
hosts_file none
refresh_pattern . 0 20% 14400
cache_mem 8 MB
cache_store_log none
hierarchy_stoplist cgi-bin ?
error_directory /usr/local/share/squid/errors/de

Sure about that? 3.1 handles error languages nicely so the _visitors_ can read the message. The above specifies that 100% of your visitors must read German.

acl manager proto cache_object
acl localhost src 127.0.0.1/32
acl localdomain srcdomain domain.de
acl localdst dstdomain .domain.de
acl localhost-dst dst 127.0.0.1/32


'dst' ACL requires DNS lookups. This will be the cause of your problems. You require it to be checked before permitting anyone access.


# user defined ACLs
always_direct deny all
refresh_pattern .domain.de 0 1% 0
refresh_pattern www.domain.de 0 1% 0
cache_peer 10.254.0.17 parent 8888 0 default no-query

always_direct allow localdst

This will never happen. You already specified 'always_direct deny all'.

never_direct allow all


This is redundant with 'always_direct deny all'

# Authentication

# User options

# Append
acl Dangerous_ports port 7 9 19
acl CONNECT method CONNECT
http_access deny Dangerous_ports
http_access deny manager !localhost
acl SSL_ports port 443 563 881
http_access deny CONNECT !SSL_ports

http_access deny localhost-dst

Above test requires DNS lookups.

AND seems to have no purpose....

always_direct/never_direct settings force all requests to be passed to the parent proxy.

anything resolving to 127.0.0.1 on this host is not necessarily resolving to 127.0.0.1 on any other host (ie the parent proxy)

NP: having a DNS server resolve 127.0.0.1 for anything public is very nasty.


Amos
--
Please be using
  Current Stable Squid 2.7.STABLE7 or 3.0.STABLE19
  Current Beta Squid 3.1.0.13

Reply via email to