Никоноров Григорий wrote:
Hello, Amos

I install the latest version of squid3 from backports (unfortunately
i cant find my problem in squid3 bugs ...)
dpkg --list |grep squid3
ii  squid3                              3.0.STABLE19-1~bpo50+1   A full 
featured Web Proxy cache (HTTP proxy)
ii  squid3-common                       3.0.STABLE19-1~bpo50+1   A full 
featured Web Proxy cache (HTTP proxy) - common files

I also delete two lines about QUERY...
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY

...and modified my refresh_patters accordingly your advice
refresh_pattern \.doc$          0       20%     4320
refresh_pattern \.zip$          0       20%     4320
refresh_pattern \.exe$          0       20%     4320
refresh_pattern \.rar$          0       20%     4320
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern -i (/cgi-bin/|\?) 0     0%      0
refresh_pattern .               0       20%     4320

I upload my squid.conf for "easy to read" purpose in pastebay.com
http://pastebay.com/94291 (no virus guys...only my squid.conf :)

p.s. regex replacement on dstdomain not helped

You wrote 19 апреля 2010 г., 13:47:21:
Никоноров Григорий wrote:
Hi,

After  the upgrade from 2.7 to 3.0.STABLE8-3 + lenny3 squid stop block
prohibited sites.

IMO grab the official backport package from http://www.backports.org/debian/pool/main/s/squid3/ if you can.

My Squid3 conf:
acl ADMIN proxy_auth "/etc/squid3/users/users.admin"
acl bad_site url_regex -i  "/etc/squid3/bad_site.acl"

bad_site.acl:
vkontakte\.ru
odnoklassniki\.ru
pagewash\.com
vk\.com

Hmm. Regardless of your squid version those are far better off being configured as a "dstdomain" ACL type. Regex is Slooooowww.

   acl bad_site dstdomain "/etc/squid3/bad_site.acl"

  bad_site.acl:
   .vkontakte.ru
   .odnoklassniki.ru
   .pagewash.com
   .vk.com

http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access allow ADMIN !bad_site
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY

The above two lines about QUERY are no longer very useful.

Remove them and make sure your *final* two refresh_patterns lines match
the new defaults for squid-3.x:

   refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
   refresh_pattern .  0 20% 4320


http_access deny all


192.168.164.111 - user from group ADMIN

Access log:
1271418317.455    103 192.168.164.111 TCP_MISS/302 494 GET 
http://vkontakte.ru/id000000 user DIRECT/93.186.231.220 text/html
1271418317.536     71 192.168.164.111 TCP_MISS/200 3767 GET 
http://vkontakte.ru/login.php? user DIRECT/93.186.231.220 text/html
1271418317.665      5 192.168.164.111 TCP_MISS/304 347 GET 
http://vkontakte.ru/images/xhead2.gif user DIRECT/93.186.231.220 -
1271418317.669      9 192.168.164.111 TCP_MISS/304 347 GET 
http://vkontakte.ru/images/header_yellow.gif user DIRECT/93.186.231.222 -
1271418317.674     15 192.168.164.111 TCP_MISS/304 347 GET 
http://vkontakte.ru/images/header_divider.gif user DIRECT/93.186.231.221 -
1271418317.690     35 192.168.164.111 TCP_MISS/304 483 GET 
http://www.tns-counter.ru/V13a***R>*vkontakte_ru/ru/CP1251/tmsec=vkontakte_total/
 user DIRECT/217.73.200.219 -
1271418317.714     55 192.168.164.111 TCP_MISS/200 386 GET 
http://counter.yadro.ru/hit? user DIRECT/88.212.196.77 image/gif
1271418321.434     82 192.168.164.111 TCP_MISS/200 5360 GET http://vk.com/ user 
DIRECT/93.186.231.221 text/html
1271418321.476    124 192.168.164.111 TCP_MISS/200 719 GET 
http://sitecheck2.opera.com/? user DIRECT/91.203.99.45 text/xml
1271418322.588     34 192.168.164.111 TCP_MISS/304 483 GET 
http://www.tns-counter.ru/V13a***R>*vkontakte_ru/ru/CP1251/tmsec=vkontakte_total/
 user DIRECT/217.73.200.220 -
1271418322.608     54 192.168.164.111 TCP_MISS/200 386 GET 
http://counter.yadro.ru/hit? user DIRECT/88.212.196.101 image/gif
1271418324.221   1670 192.168.164.111 TCP_MISS/200 6368 CONNECT 
certs.opera.com:443 user DIRECT/91.203.99.57 -
1271418324.358     69 192.168.164.111 TCP_MISS/200 738 GET 
http://login.vk.com/? user DIRECT/93.186.229.129 text/html
1271418324.433     56 192.168.164.111 TCP_MISS/200 617 POST 
http://vk.com/login.php? user DIRECT/93.186.231.222 text/html



I can't see any reason why those requests might go through. Is there any
additional http_access configuration anywhere?

If not, try with the backports package and see if it goes away.

Amos


Wading through that config I find the very first http_access:

 acl ncsa_users proxy_auth REQUIRED
 http_access allow ncsa_users

... any user with a valid login has unlimited access through your server.

The http_access rules following that line apply only to non-logged in users.


Amos
--
Please be using
  Current Stable Squid 2.7.STABLE9 or 3.1.1

Reply via email to