Estou tentando usar o proxy transparente, mas não esta funcionando da forma que deveria.
todos os sites https é que não abrem, EX: gmail.com, orkut.com. E tambem o msn que usa as portas 1863 e 443 não funciona. Eu sinceramente ja virei a noite tentando entender o por que com o proxy default eu consigo acessar ao gmail e no transparente ele não funciona. A importante o msn não funciona nem no proxy default e nem no transparente tb. Agradeço toda a ajuda, deem uma analizada no squid e no iptables. Segue o meu squid. conf e meu firewall teste:

Squid.conf:

http_port 3128
cache_mem 96 MB
cache_dir ufs /var/spool/squid 100 16 256
maximum_object_size 81192 KB
maximum_object_size_in_memory 1024 KB
cache_access_log /var/log/squid/access.log
cache_log /var/log/squid/cache.log
cache_store_log none
cache_mgr jasonnfedora@gmail.com
log_fqdn off
emulate_httpd_log off
client_lifetime 12 hours
ftp_user anonymous@user.com
ftp_passive on
dns_retransmit_interval 20 seconds
dns_timeout 100 seconds
redirect_rewrites_host_header off
positive_dns_ttl 1 hours
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern .               0       20%     4320
acl all src 192.168.1.0/255.255.255.0
acl diretoria src 192.168.1.5 192.168.1.6
acl expediente time M-F 08:00-18:00
acl almoco time 12:00-14:00
acl diasuteis time M-F
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443 563
acl Safe_ports port 80          # http
acl Safe_ports port 21          # ftp
acl Safe_ports port 443 563     # https, snews
acl Safe_ports port 1863        # msn
acl Safe_ports port 70          # gopher
acl Safe_ports port 210         # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280         # http-mgmt
acl Safe_ports port 488         # gss-http
acl Safe_ports port 591         # filemaker
acl Safe_ports port 777         # multiling http
acl CONNECT method CONNECT

http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access allow CONNECT !SSL_ports
http_access allow localhost
http_access allow all
http_reply_access allow all
icp_access allow all
coredump_dir /var/spool/squid
ie_refresh on
error_directory /usr/share/squid/errors/Portuguese
visible_hostname fbrasil
httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_with_proxy on
httpd_accel_uses_host_header on


Meu Iptables:

#---------------------------------------#
# COMPARTILHANDO ACESSO INTERNET    #
#---------------------------------------#

echo "1" > /proc/sys/net/ipv4/ip_forward

IPADDR=`/sbin/ifconfig | grep -A 4 ppp0 | awk '/inet end/ { print $3 } ' | sed -e s/addr://`  # Endereco IP valido do servidor
EXTERNAL_INTERFACE="ppp0"              # Interface de rede conectada a Internet
LOCAL_INTERFACE="eth1"                 # Interface de rede conectada a intranet
LOOPBACK_INTERFACE="lo"                # Interface de rede loopback
INTRANET=" 192.168.1.0/24"              #Faixa privada de enderecamento
PRIMARY_NAMESERVER="200.165.132.154"   # Servidor DNS primario TELEMAR
SECONDARY_NAMESERVER=" 200.165.132.147" # Servidor DNS primario TELEMAR
LOOPBACK="127.0.0.0/8"                 # Faixa de enderecamento loopback
CLASS_A=" 10.0.0.0/8"                   # Redes privadas classe A
CLASS_B="172.16.0.0/12"                # Redes privadas classe B
CLASS_C=" 192.168.0.0/24"               # Redes privadas classe C
CLASS_D_MULTICAST="224.0.0.0/4"        # Enderecamento multicast classe D
CLASS_E_RESERVED_NET=" 240.0.0.0/5"     # Enderecamento reservado classe E
BROADCAST_SRC="0.0.0.0"                # Endereco de braodcast de origem
BROADCAST_DEST=" 255.255.255.255"       # Endereco de braodcast de origem
PRIVPORTS="0:1023"                     # Faixa de portas reservadas
UNPRIVPORTS="1024:"                    # Faixa de portas nao reservadas
SSH_LOCAL_PORTS="1022:65535"           # Faixa de portas para clientes ssh locais
SSH_REMOTE_PORTS="512:65535"           # Faixa de portas para clientes ssh remotos
SNMP_REMOTE_PORTS="512:65535"          # Faixa de portas para clientes ssh remotos
TRACEROUTE_SRC_PORTS="32769:65535"     # Faixa de portas para traceroute de origem
TRACEROUTE_DEST_PORTS="33434:33523"    # Faixa de portas para traceroute de destino
FBRASIL= 192.168.1.50               # Ip FIRE

#------------------------------------------------------------------------------#
# POLITICAS E DIRETIVAS INICIAIS                                        #
#------------------------------------------------------------------------------#

# DENY a politica default
# Serao aceitas conexoes de entrada e saida explicitamente desejadas

# Remove todas as regras de filtragem existentes

iptables -F

# Remove quaisquer cadeias existentes definidas pelo usuario

iptables -X

# Define politica padrao para DROP

iptables -P INPUT   DROP
iptables -P OUTPUT  DROP
iptables -P FORWARD DROP

# Aceita trafego na interface LOOPBACK

iptables -A INPUT  -i $LOOPBACK_INTERFACE  -j ACCEPT
iptables -A OUTPUT -o $LOOPBACK_INTERFACE  -j ACCEPT

# Todas as maquinas internas tem acesso a maquina firewall

iptables -A INPUT  -i $LOCAL_INTERFACE -s $INTRANET -j ACCEPT
iptables -A OUTPUT -o $LOCAL_INTERFACE -d $INTRANET -j ACCEPT

# Impede pacotes netbios sairem da rede local

iptables -A FORWARD -p tcp --sport 137:139 -o ppp0 -j DROP
iptables -A FORWARD -p udp --sport 137:139 -o ppp0 -j DROP
iptables -A OUTPUT -p tcp --sport 137:139 -o ppp0 -j DROP
iptables -A OUTPUT -p udp --sport 137:139 -o ppp0 -j DROP

# Descarta pacotes XMAS mal-formados.

iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP
iptables -A FORWARD -p tcp --tcp-flags ALL ALL -j DROP

# Descarta pacotes NULL mal-formados

iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
iptables -A FORWARD -p tcp --tcp-flags ALL NONE -j DROP

# Impede pacotes falsos de atravessarem o firewall

iptables -A FORWARD -i $LOCAL_INTERFACE -s ! $INTRANET -j DROP

#------------------------------------------------------------------------------#
# POLITICAS E DIRETIVAS ANTI-SPOOFING E ENDERECOS FORJADOS                     #
#------------------------------------------------------------------------------#

# Rejeita pacotes de spoofing.
# Ignora ederecos de origem ilegais.
# Protege a rede de envio para enderecos forjados.

# Rejeita pacotes de entrada pretensamente do endereco externo.

iptables -A INPUT -s $IPADDR -j DROP

# Recusa pacotes de entrada de redes privadas classe A, B ou C.

iptables -A INPUT -s $CLASS_A -j DROP
iptables -A INPUT -s $CLASS_B -j DROP
iptables -A INPUT -s $CLASS_C -j ACCEPT

# Rejeita pacotes de endereco de broadcast de origem

iptables -A INPUT -s $BROADCAST_DEST -j DROP
iptables -A INPUT -d $BROADCAST_SRC -j DROP

# Rejeita enderecos de classe D multicast
# Enderecos multicast de de origem sao ilegais.
# Multicast usa UDP.

iptables -A INPUT -s $CLASS_D_MULTICAST -j DROP

# Rejeita endereços IP reservados de classe E

iptables -A INPUT -s $CLASS_E_RESERVED_NET -j DROP

# Rejeita enderecos especiais de classes reservadas

iptables -A INPUT -s 0.0.0.0/8 -j DROP
iptables -A INPUT -s 127.0.0.0/8 -j DROP
iptables -A INPUT -s 169.254.0.0/16 -j DROP
iptables -A INPUT -s 192.0.2.0/24 -j DROP
iptables -A INPUT -s 224.0.0.0/3 -j DROP

#################################################################
#MAQUINAS COM ACESSO DIRETO A INTERNET                          #
#################################################################

#LIBERACAO DA PORTA 80 PARA REDE
iptables -A FORWARD -p tcp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport 80 -j ACCEPT
iptables -A FORWARD -p udp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport 80 -j ACCEPT

#LIBERACAO DA PORTA 1863 PARA REDE
iptables -A FORWARD -p tcp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport 1863 -j ACCEPT
iptables -A FORWARD -p udp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport 1863 -j ACCEPT

#LIBERACAO DA PORTA 443 PARA REDE
iptables -A FORWARD -p tcp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport 443 -j ACCEPT
iptables -A FORWARD -p udp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport 443 -j ACCEPT

################################################################################
# DIRETIVAS ESPECIAIS - NEGACAO - INTERNO > EXTERNO                            #
################################################################################

#BLOQUEIO DO ACESSO DIRETO A HTTP

iptables -A FORWARD -p tcp --dport 80 -j REJECT
iptables -A FORWARD -p udp --dport 80 -j REJECT

#BLOQUEIO DE ACESSO DIRETO A TELNET

iptables -A FORWARD -p tcp --dport 23 -j REJECT
iptables -A FORWARD -p udp --dport 23 -j REJECT

#BLOQUEIO DE ACESSO DIRETO A HTTPS

iptables -A FORWARD -p tcp --dport 443 -j REJECT
iptables -A FORWARD -p udp --dport 443 -j REJECT

# BLOQUEIO DE MSN

iptables -A FORWARD -p tcp --dport 1863 -j REJECT
iptables -A FORWARD -p udp --dport 1863 -j REJECT

################################################################################
# DIRETIVAS DE CONEXOES E MASCARAMENTO                                         #
################################################################################

#TODO O TRAFEGO INTERNO MASCARADO EXTERNAMENTE.

iptables -A POSTROUTING -t nat -o $EXTERNAL_INTERFACE -j MASQUERADE

#PROXY TRANSPARENTE
iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -s 0/0 -j REDIRECT --to-port 3128

#PERMITE QUE TODOS OS PACOTES SAIAM DE SUA REDE.

iptables -A FORWARD -m state --state NEW,ESTABLISHED -i $LOCAL_INTERFACE -s $INTRANET -j ACCEPT

#PERMITE O RETORNO DE PACOTES ASSOCIADOS COM SUAS CONEXOES.

iptables -A FORWARD -m state --state ESTABLISHED,RELATED -i $EXTERNAL_INTERFACE -s ! $INTRANET -j ACCEPT

################################################################################
# DIRETIVA GLOBAL DE NAGACAO - ACRESCENTE AS EXEXOES ANTES DESTA DIRETIVA      #
################################################################################

#BLOQUEIO AS PORTAS NAO PRIVILEGIADAS
#iptables -A FORWARD -p tcp --dport $UNPRIVPORTS -j REJECT
#iptables -A FORWARD -p udp --dport $UNPRIVPORTS -j REJECT

################################################################################
# DIRETIVAS DE CONEXAO                                                   #
################################################################################

# DNS: SERVIDOR PRIMARIO (53)
# CLIENTE/SERVIDOR PARA PESQUISA OU RESPOSTA DO SERVIDOR.

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p udp --source-port $UNPRIVPORTS -d $IPADDR --destination-port 53 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port 53 --destination-port $UNPRIVPORTS -j ACCEPT

# DNS: SERVIDOR DE ENCAMINHAMENTO (53)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p udp -s $PRIMARY_NAMESERVER --source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port $UNPRIVPORTS -d $PRIMARY_NAMESERVER --destination-port 53 -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn -s $PRIMARY_NAMESERVER --source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS -d $PRIMARY_NAMESERVER --destination-port 53 -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p udp -s $SECONDARY_NAMESERVER --source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port $UNPRIVPORTS -d $SECONDARY_NAMESERVER --destination-port 53 -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn -s $SECONDARY_NAMESERVER --source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS -d $SECONDARY_NAMESERVER --destination-port 53 -j ACCEPT

# DNS: TRANSFERENCIA DE ZONAS (53)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS -d $IPADDR --destination-port 53 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port 53 --destination-port $UNPRIVPORTS -j ACCEPT


iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port 53 -d $IPADDR --destination-port 53 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port 53 --destination-port 53 -j ACCEPT


# DNS: CLIENTES (53)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p udp --source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 53 -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 53 -j ACCEPT

# HTTP: CLIENTE (80)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 80 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 80 -j ACCEPT

# HTTPS: CLIENTE (443)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 443 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 443 -j ACCEPT

# SSH: SERVIDOR (2222)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port $SSH_REMOTE_PORTS -d $IPADDR --destination-port 2222 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR --source-port 2222 --destination-port $SSH_REMOTE_PORTS -j ACCEPT

# SNMP: SERVIDOR (161)

iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp -d $IPADDR --destination-port 161 -j DROP

# SNMP: SERVIDOR (199)

iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp -d $IPADDR --destination-port 199 -j DROP


# SSH: CLIENTE (2222)

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $SSH_LOCAL_PORTS --destination-port 2222 -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 2222 -d $IPADDR --destination-port $SSH_LOCAL_PORTS -j ACCEPT

# POP: SERVIDOR (110)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS -d $IPADDR --destination-port 110 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR --source-port 110 --destination-port $UNPRIVPORTS -j ACCEPT

# POP: CLIENTE (110)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 110 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 110 -j ACCEPT

# IMAP: CLIENTE (143)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 143 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 143 -j ACCEPT

# SMTP: SERVIDOR (25)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp  --source-port $UNPRIVPORTS -d $IPADDR --destination-port 25 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR --source-port 25 --destination-port $UNPRIVPORTS -j ACCEPT

# SMTP: CLIENTE (25)

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 25 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 25 -j ACCEPT

# FTP: SERVIDOR (21)

# REQUISICOES DE ENTRADA

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS -d $IPADDR --destination-port 21 -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR --source-port 21 --destination-port $UNPRIVPORTS -j ACCEPT

# NODO PORT: RESPOSTA DO CANAL DE DADOS

#iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port 20 --destination-port $UNPRIVPORTS -j ACCEPT

#iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port $UNPRIVPORTS -d $IPADDR --destination-port 20 -j ACCEPT

# MODO PASSIVE: RESPOSTA DO CANAL DE DADOS

#iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

#iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR --source-port $UNPRIVPORTS --destination-port $UNPRIVPORTS -j ACCEPT

################################################################################
# DIRETIVAS DE CONEXOES E MASCARAMENTO                                         #
################################################################################
# FTP: CLIENTE (21)
# ---------------

# REQUISICOES DE SAIDA

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port $UNPRIVPORTS --destination-port 21 -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 21 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

# MODO PORT: RESPOSTA DO CANAL DE DADOS

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp --source-port 20 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR --source-port $UNPRIVPORTS --destination-port 20 -j ACCEPT

################################################################################
# DIRETIVAS DE CONEXOES E MASCARAMENTO                                         #
################################################################################

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type echo-reply -d $IPADDR -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type destination-unreachable -d $IPADDR -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type source-quench -d $IPADDR -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type time-exceeded -d $IPADDR -j ACCEPT

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type parameter-problem -d $IPADDR -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp -s $IPADDR --icmp-type fragmentation-needed -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp -s $IPADDR --icmp-type source-quench -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp  -s $IPADDR --icmp-type echo-request -j ACCEPT

iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp  -s $IPADDR --icmp-type parameter-problem -j ACCEPT

# HABILITA LOGGING PARA PACOTES PROIBIDOS SELECIONADOS

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p tcp  -j DROP

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p udp --destination-port $PRIVPORTS -j DROP

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p udp --destination-port $UNPRIVPORTS -j DROP

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type 5 -j DROP

iptables -A INPUT  -i $EXTERNAL_INTERFACE -p icmp --icmp-type 13/255 -j DROP

iptables -A OUTPUT -o $EXTERNAL_INTERFACE  -j REJECT



Em 10/02/07, Robert Pereira <robertjs@gmail.com> escreveu:
Brother:
 
Cola aqui na lista seu squid.conf (sem os comentários)

 
Em 09/02/07, Cristiano Furtado <jasonnfedora@gmail.com > escreveu:
Galera estou com um outro problema aqui agora. Quando ativo o squid, não consigo abrir o gmail.com e nem o msn. Não tenho nenhuma lista no squid de bloqueio, e quando eu estou acessando com o squid parado tudo funciona. Deixa eu explicar melhor os problemas:
1- Proxy Default

Acesso ao gmail, mais não acesso ao msn.

2- Proxy Transparente

Não acesso ao msn nem ao gmail.com

Eu sinceramente não consigo entender. Estou aqui tentando resolver isso mesmo assim. valeu ae.

--
Cristiano Furtado dos Santos
Administrador de Sistemas Linux
http://jasonnfedora.eti.br
http://fedora.org.br

--
Fedora-users-br mailing list
Fedora-users-br@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-users-br



--
Fedora-users-br mailing list
Fedora-users-br@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-users-br




--
Cristiano Furtado dos Santos
Administrador de Sistemas Linux
http://jasonnfedora.eti.br
http://fedora.org.br