Johan de Vries writes:
> 
> I am trying to make a setup with squidGuard, but I have some troubles
<snip>

> The squid.conf is changed:
> On line 880   redirect_program /usr/local/bin/squidGuard
> On line 1460   http_access allow all
<snip>

Are you adding squidGuard to an established squid installation?  Or
are you installing and debugging both squid and squidGuard at the 
same time?

> The squidGuard.conf  is put to 777  and contains:
> acl {
>       default {
>               pass none
>       }
> }

> Still all pages are accessable

There's nothing that squidGuard can do with that config file. 
squidGuard cannot "block", it can only "redirect". And the only
way that squidGuard can redirect is if you tell it how.

The documentation lists some testing procedures starting with about
number 10 on this page: <http://www.squidguard.org/install/>.  There
are example configuration files listed here:
<http://www.squidguard.org/config/#Minimal>

Or, if you prefer, you can use this:

# ## Simple squidGuard.conf test file ##

# Path declarations
# It's a good idea to include the path statements even if you
# are using the default locations.  Be sure to set the ownership
# and permissions of the paths and the files

logdir  /usr/local/squidGuard/log
dbhome  /usr/local/squidGuard/db


# Source group declarations
# Create a test source group that contains your ip

src testsource {
    ip              192.168.0.25
}


# Destination group declarations
# Create a test destination group and domains file. Remember that the
# location is the combination of your dbhome and the domainlist
# specification. As listed here, this domains file would be located
# /usr/local/squidGuard/db/blacklists/testdest/domains
# The content of the domains file should be 'yahoo.com', w/o quotes.
# Don't forget path/file ownership and permissions.
# You can leave the redirect statetment below as is for your testing.
# Create 'blocked.log' in the same directory and with the same
# ownership and permisssions as your squidGuard.log file.

dest testdest {
    domainlist      blacklists/testdest/domains
    redirect        http://tinyurl.com/2zdr5
    log             blocked.log
}


# acl declarations
# This will allow you (192.168.0.25) to browse anywhere but testdest.
# If you try to go to yahoo.com you will be redirected.
# You can leave the redirect statetment below as is for your testing.
# If you try browsing from an undefined source (not 192.168.0.25),
# you will be processed by the default acl and redirected.

acl {
    testsource {
        pass        !testdest all
    }

    default {
        pass        none
        redirect    http://tinyurl.com/2m5v5
        log         blocked.log
    }
}

# ## End of Simple squidGuard.conf test file ##

Hope that helps!

Rick




> 
> The current setup is:
> Redhat 7.3
> Squid 2.4.STABLE6
> squidGuard 1.2.0
> ./configure --with-sg-config=/usr/local/squidGuard/squidGuard.conf \
> --with-sg-logdir=/var/log/squidGuard
> 
> The squidGuard.conf  is put to 777  and contains:
> acl {
>       default {
>               pass none
>       }
> }
> 
> The squid.conf is changed:
> On line 880   redirect_program /usr/local/bin/squidGuard
> On line 1460   http_access allow all
> 
> After a restart of squid the squidGuard logfile shows a: started  
> and a: ready for requests
> 
> Still all pages are accessable
> Squid is only responding to the http_acces parameter, and not to the squidGuard.conf
> 
> When squidGuard.conf is messed up, then the log shows a: going into emergency mode
> 
> 
> Any suggestions ????
> 

Reply via email to