Estou tentando usar o proxy transparente, mas não esta funcionando da forma
que deveria.
todos os sites https é que não abrem, EX:
gmail.com,
orkut.com. E tambem o
msn que usa as portas 1863 e 443 não funciona. Eu sinceramente ja virei a
noite tentando entender o por que com o proxy default eu consigo acessar ao
gmail e no transparente ele não funciona. A importante o msn não funciona
nem no proxy default e nem no transparente tb. Agradeço toda a ajuda, deem
uma analizada no squid e no iptables. Segue o meu squid. conf e meu firewall
teste:
Squid.conf:
http_port 3128
cache_mem 96 MB
cache_dir ufs /var/spool/squid 100 16 256
maximum_object_size 81192 KB
maximum_object_size_in_memory 1024 KB
cache_access_log /var/log/squid/access.log
cache_log /var/log/squid/cache.log
cache_store_log none
cache_mgr jasonnfedora(a)gmail.com
log_fqdn off
emulate_httpd_log off
client_lifetime 12 hours
ftp_user anonymous(a)user.com
ftp_passive on
dns_retransmit_interval 20 seconds
dns_timeout 100 seconds
redirect_rewrites_host_header off
positive_dns_ttl 1 hours
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
no_cache deny QUERY
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern . 0 20% 4320
acl all src 192.168.1.0/255.255.255.0
acl diretoria src 192.168.1.5 192.168.1.6
acl expediente time M-F 08:00-18:00
acl almoco time 12:00-14:00
acl diasuteis time M-F
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443 563
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 563 # https, snews
acl Safe_ports port 1863 # msn
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access allow CONNECT !SSL_ports
http_access allow localhost
http_access allow all
http_reply_access allow all
icp_access allow all
coredump_dir /var/spool/squid
ie_refresh on
error_directory /usr/share/squid/errors/Portuguese
visible_hostname fbrasil
httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_with_proxy on
httpd_accel_uses_host_header on
Meu Iptables:
#---------------------------------------#
# COMPARTILHANDO ACESSO INTERNET #
#---------------------------------------#
echo "1" > /proc/sys/net/ipv4/ip_forward
IPADDR=`/sbin/ifconfig | grep -A 4 ppp0 | awk '/inet end/ { print $3 } ' |
sed -e s/addr://` # Endereco IP valido do servidor
EXTERNAL_INTERFACE="ppp0" # Interface de rede conectada a
Internet
LOCAL_INTERFACE="eth1" # Interface de rede conectada a
intranet
LOOPBACK_INTERFACE="lo" # Interface de rede loopback
INTRANET="192.168.1.0/24" #Faixa privada de enderecamento
PRIMARY_NAMESERVER="200.165.132.154" # Servidor DNS primario TELEMAR
SECONDARY_NAMESERVER="200.165.132.147" # Servidor DNS primario TELEMAR
LOOPBACK="127.0.0.0/8" # Faixa de enderecamento loopback
CLASS_A="10.0.0.0/8" # Redes privadas classe A
CLASS_B="172.16.0.0/12" # Redes privadas classe B
CLASS_C="192.168.0.0/24" # Redes privadas classe C
CLASS_D_MULTICAST="224.0.0.0/4" # Enderecamento multicast classe D
CLASS_E_RESERVED_NET="240.0.0.0/5" # Enderecamento reservado classe E
BROADCAST_SRC="0.0.0.0" # Endereco de braodcast de origem
BROADCAST_DEST="255.255.255.255" # Endereco de braodcast de origem
PRIVPORTS="0:1023" # Faixa de portas reservadas
UNPRIVPORTS="1024:" # Faixa de portas nao reservadas
SSH_LOCAL_PORTS="1022:65535" # Faixa de portas para clientes ssh
locais
SSH_REMOTE_PORTS="512:65535" # Faixa de portas para clientes ssh
remotos
SNMP_REMOTE_PORTS="512:65535" # Faixa de portas para clientes ssh
remotos
TRACEROUTE_SRC_PORTS="32769:65535" # Faixa de portas para traceroute de
origem
TRACEROUTE_DEST_PORTS="33434:33523" # Faixa de portas para traceroute de
destino
FBRASIL=192.168.1.50 # Ip FIRE
#------------------------------------------------------------------------------#
# POLITICAS E DIRETIVAS INICIAIS #
#------------------------------------------------------------------------------#
# DENY a politica default
# Serao aceitas conexoes de entrada e saida explicitamente desejadas
# Remove todas as regras de filtragem existentes
iptables -F
# Remove quaisquer cadeias existentes definidas pelo usuario
iptables -X
# Define politica padrao para DROP
iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
# Aceita trafego na interface LOOPBACK
iptables -A INPUT -i $LOOPBACK_INTERFACE -j ACCEPT
iptables -A OUTPUT -o $LOOPBACK_INTERFACE -j ACCEPT
# Todas as maquinas internas tem acesso a maquina firewall
iptables -A INPUT -i $LOCAL_INTERFACE -s $INTRANET -j ACCEPT
iptables -A OUTPUT -o $LOCAL_INTERFACE -d $INTRANET -j ACCEPT
# Impede pacotes netbios sairem da rede local
iptables -A FORWARD -p tcp --sport 137:139 -o ppp0 -j DROP
iptables -A FORWARD -p udp --sport 137:139 -o ppp0 -j DROP
iptables -A OUTPUT -p tcp --sport 137:139 -o ppp0 -j DROP
iptables -A OUTPUT -p udp --sport 137:139 -o ppp0 -j DROP
# Descarta pacotes XMAS mal-formados.
iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP
iptables -A FORWARD -p tcp --tcp-flags ALL ALL -j DROP
# Descarta pacotes NULL mal-formados
iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
iptables -A FORWARD -p tcp --tcp-flags ALL NONE -j DROP
# Impede pacotes falsos de atravessarem o firewall
iptables -A FORWARD -i $LOCAL_INTERFACE -s ! $INTRANET -j DROP
#------------------------------------------------------------------------------#
# POLITICAS E DIRETIVAS ANTI-SPOOFING E ENDERECOS
FORJADOS #
#------------------------------------------------------------------------------#
# Rejeita pacotes de spoofing.
# Ignora ederecos de origem ilegais.
# Protege a rede de envio para enderecos forjados.
# Rejeita pacotes de entrada pretensamente do endereco externo.
iptables -A INPUT -s $IPADDR -j DROP
# Recusa pacotes de entrada de redes privadas classe A, B ou C.
iptables -A INPUT -s $CLASS_A -j DROP
iptables -A INPUT -s $CLASS_B -j DROP
iptables -A INPUT -s $CLASS_C -j ACCEPT
# Rejeita pacotes de endereco de broadcast de origem
iptables -A INPUT -s $BROADCAST_DEST -j DROP
iptables -A INPUT -d $BROADCAST_SRC -j DROP
# Rejeita enderecos de classe D multicast
# Enderecos multicast de de origem sao ilegais.
# Multicast usa UDP.
iptables -A INPUT -s $CLASS_D_MULTICAST -j DROP
# Rejeita endereços IP reservados de classe E
iptables -A INPUT -s $CLASS_E_RESERVED_NET -j DROP
# Rejeita enderecos especiais de classes reservadas
iptables -A INPUT -s 0.0.0.0/8 -j DROP
iptables -A INPUT -s 127.0.0.0/8 -j DROP
iptables -A INPUT -s 169.254.0.0/16 -j DROP
iptables -A INPUT -s 192.0.2.0/24 -j DROP
iptables -A INPUT -s 224.0.0.0/3 -j DROP
#################################################################
#MAQUINAS COM ACESSO DIRETO A INTERNET #
#################################################################
#LIBERACAO DA PORTA 80 PARA REDE
iptables -A FORWARD -p tcp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport
80 -j ACCEPT
iptables -A FORWARD -p udp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport
80 -j ACCEPT
#LIBERACAO DA PORTA 1863 PARA REDE
iptables -A FORWARD -p tcp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport
1863 -j ACCEPT
iptables -A FORWARD -p udp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport
1863 -j ACCEPT
#LIBERACAO DA PORTA 443 PARA REDE
iptables -A FORWARD -p tcp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport
443 -j ACCEPT
iptables -A FORWARD -p udp -s 192.168.1.0/24 --sport 1:65535 -d 0/0 --dport
443 -j ACCEPT
################################################################################
# DIRETIVAS ESPECIAIS - NEGACAO - INTERNO >
EXTERNO #
################################################################################
#BLOQUEIO DO ACESSO DIRETO A HTTP
iptables -A FORWARD -p tcp --dport 80 -j REJECT
iptables -A FORWARD -p udp --dport 80 -j REJECT
#BLOQUEIO DE ACESSO DIRETO A TELNET
iptables -A FORWARD -p tcp --dport 23 -j REJECT
iptables -A FORWARD -p udp --dport 23 -j REJECT
#BLOQUEIO DE ACESSO DIRETO A HTTPS
iptables -A FORWARD -p tcp --dport 443 -j REJECT
iptables -A FORWARD -p udp --dport 443 -j REJECT
# BLOQUEIO DE MSN
iptables -A FORWARD -p tcp --dport 1863 -j REJECT
iptables -A FORWARD -p udp --dport 1863 -j REJECT
################################################################################
# DIRETIVAS DE CONEXOES E
MASCARAMENTO #
################################################################################
#TODO O TRAFEGO INTERNO MASCARADO EXTERNAMENTE.
iptables -A POSTROUTING -t nat -o $EXTERNAL_INTERFACE -j MASQUERADE
#PROXY TRANSPARENTE
iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -s 0/0 -j REDIRECT
--to-port 3128
#PERMITE QUE TODOS OS PACOTES SAIAM DE SUA REDE.
iptables -A FORWARD -m state --state NEW,ESTABLISHED -i $LOCAL_INTERFACE -s
$INTRANET -j ACCEPT
#PERMITE O RETORNO DE PACOTES ASSOCIADOS COM SUAS CONEXOES.
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -i
$EXTERNAL_INTERFACE -s ! $INTRANET -j ACCEPT
################################################################################
# DIRETIVA GLOBAL DE NAGACAO - ACRESCENTE AS EXEXOES ANTES DESTA
DIRETIVA #
################################################################################
#BLOQUEIO AS PORTAS NAO PRIVILEGIADAS
#iptables -A FORWARD -p tcp --dport $UNPRIVPORTS -j REJECT
#iptables -A FORWARD -p udp --dport $UNPRIVPORTS -j REJECT
################################################################################
# DIRETIVAS DE CONEXAO #
################################################################################
# DNS: SERVIDOR PRIMARIO (53)
# CLIENTE/SERVIDOR PARA PESQUISA OU RESPOSTA DO SERVIDOR.
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp --source-port $UNPRIVPORTS
-d $IPADDR --destination-port 53 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port 53
--destination-port $UNPRIVPORTS -j ACCEPT
# DNS: SERVIDOR DE ENCAMINHAMENTO (53)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp -s $PRIMARY_NAMESERVER
--source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port
$UNPRIVPORTS -d $PRIMARY_NAMESERVER --destination-port 53 -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn -s
$PRIMARY_NAMESERVER --source-port 53 -d $IPADDR --destination-port
$UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS -d $PRIMARY_NAMESERVER --destination-port 53 -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp -s $SECONDARY_NAMESERVER
--source-port 53 -d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port
$UNPRIVPORTS -d $SECONDARY_NAMESERVER --destination-port 53 -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn -s
$SECONDARY_NAMESERVER --source-port 53 -d $IPADDR --destination-port
$UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS -d $SECONDARY_NAMESERVER --destination-port 53 -j ACCEPT
# DNS: TRANSFERENCIA DE ZONAS (53)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS
-d $IPADDR --destination-port 53 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port 53
--destination-port $UNPRIVPORTS -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port 53 -d $IPADDR
--destination-port 53 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port 53
--destination-port 53 -j ACCEPT
# DNS: CLIENTES (53)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp --source-port 53 -d $IPADDR
--destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p udp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 53 -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 53 -d
$IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 53 -j ACCEPT
# HTTP: CLIENTE (80)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 80 -d
$IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 80 -j ACCEPT
# HTTPS: CLIENTE (443)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 443
-d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 443 -j ACCEPT
# SSH: SERVIDOR (2222)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port
$SSH_REMOTE_PORTS -d $IPADDR --destination-port 2222 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR
--source-port 2222 --destination-port $SSH_REMOTE_PORTS -j ACCEPT
# SNMP: SERVIDOR (161)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp -d $IPADDR
--destination-port 161 -j DROP
# SNMP: SERVIDOR (199)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp -d $IPADDR
--destination-port 199 -j DROP
# SSH: CLIENTE (2222)
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$SSH_LOCAL_PORTS --destination-port 2222 -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 2222
-d $IPADDR --destination-port $SSH_LOCAL_PORTS -j ACCEPT
# POP: SERVIDOR (110)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS
-d $IPADDR --destination-port 110 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR
--source-port 110 --destination-port $UNPRIVPORTS -j ACCEPT
# POP: CLIENTE (110)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 110
-d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 110 -j ACCEPT
# IMAP: CLIENTE (143)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 143
-d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 143 -j ACCEPT
# SMTP: SERVIDOR (25)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS
-d $IPADDR --destination-port 25 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR
--source-port 25 --destination-port $UNPRIVPORTS -j ACCEPT
# SMTP: CLIENTE (25)
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 25 -d
$IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 25 -j ACCEPT
# FTP: SERVIDOR (21)
# REQUISICOES DE ENTRADA
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS
-d $IPADDR --destination-port 21 -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR
--source-port 21 --destination-port $UNPRIVPORTS -j ACCEPT
# NODO PORT: RESPOSTA DO CANAL DE DADOS
#iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
20 --destination-port $UNPRIVPORTS -j ACCEPT
#iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port
$UNPRIVPORTS -d $IPADDR --destination-port 20 -j ACCEPT
# MODO PASSIVE: RESPOSTA DO CANAL DE DADOS
#iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port $UNPRIVPORTS
-d $IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
#iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR
--source-port $UNPRIVPORTS --destination-port $UNPRIVPORTS -j ACCEPT
################################################################################
# DIRETIVAS DE CONEXOES E
MASCARAMENTO #
################################################################################
# FTP: CLIENTE (21)
# ---------------
# REQUISICOES DE SAIDA
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp -s $IPADDR --source-port
$UNPRIVPORTS --destination-port 21 -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp ! --syn --source-port 21 -d
$IPADDR --destination-port $UNPRIVPORTS -j ACCEPT
# MODO PORT: RESPOSTA DO CANAL DE DADOS
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp --source-port 20 -d $IPADDR
--destination-port $UNPRIVPORTS -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p tcp ! --syn -s $IPADDR
--source-port $UNPRIVPORTS --destination-port 20 -j ACCEPT
################################################################################
# DIRETIVAS DE CONEXOES E
MASCARAMENTO #
################################################################################
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type echo-reply -d
$IPADDR -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type
destination-unreachable -d $IPADDR -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type source-quench
-d $IPADDR -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type time-exceeded
-d $IPADDR -j ACCEPT
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type
parameter-problem -d $IPADDR -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp -s $IPADDR --icmp-type
fragmentation-needed -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp -s $IPADDR --icmp-type
source-quench -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp -s $IPADDR --icmp-type
echo-request -j ACCEPT
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -p icmp -s $IPADDR --icmp-type
parameter-problem -j ACCEPT
# HABILITA LOGGING PARA PACOTES PROIBIDOS SELECIONADOS
iptables -A INPUT -i $EXTERNAL_INTERFACE -p tcp -j DROP
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp --destination-port
$PRIVPORTS -j DROP
iptables -A INPUT -i $EXTERNAL_INTERFACE -p udp --destination-port
$UNPRIVPORTS -j DROP
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type 5 -j DROP
iptables -A INPUT -i $EXTERNAL_INTERFACE -p icmp --icmp-type 13/255 -j DROP
iptables -A OUTPUT -o $EXTERNAL_INTERFACE -j REJECT
Em 10/02/07, Robert Pereira <robertjs(a)gmail.com> escreveu:
Brother:
Cola aqui na lista seu squid.conf (sem os comentários)
Em 09/02/07, Cristiano Furtado <jasonnfedora(a)gmail.com> escreveu:
>
> Galera estou com um outro problema aqui agora. Quando ativo o squid, não
> consigo abrir o
gmail.com e nem o msn. Não tenho nenhuma lista no squid
> de bloqueio, e quando eu estou acessando com o squid parado tudo funciona.
> Deixa eu explicar melhor os problemas:
> 1- Proxy Default
>
> Acesso ao gmail, mais não acesso ao msn.
>
> 2- Proxy Transparente
>
> Não acesso ao msn nem ao
gmail.com
>
> Eu sinceramente não consigo entender. Estou aqui tentando resolver isso
> mesmo assim. valeu ae.
>
> --
> Cristiano Furtado dos Santos
> Administrador de Sistemas Linux
>
http://jasonnfedora.eti.br
>
http://fedora.org.br
> --
> Fedora-users-br mailing list
> Fedora-users-br(a)redhat.com
>
https://www.redhat.com/mailman/listinfo/fedora-users-br
>
>
--
Fedora-users-br mailing list
Fedora-users-br(a)redhat.com
https://www.redhat.com/mailman/listinfo/fedora-users-br
--
Cristiano Furtado dos Santos
Administrador de Sistemas Linux
http://jasonnfedora.eti.br
http://fedora.org.br