Luciano Sousa wrote:
hello. i'm having a problem with idiot. at least once every two days I have to clear the cache of my squid, because it begins to deny all access, probably because it is full ...
Your cache.log (/usr/local/squid/logs/cache.log) might give more information on what's going on.
my squid.conf http_port 3128 icp_port 3128 hierarchy_stoplist cgi-bin ? cache_mem 500 MB cache_swap_low 90 cache_swap_high 95 maximum_object_size 4096 KB ipcache_size 1024 ipcache_low 90 ipcache_high 95 cache_dir ufs /usr/local/squid/cache 1500 32 256 cache_access_log /usr/local/squid/logs/access.log pid_filename /usr/local/squid/logs/squid.pid acl manager proto cache_object cache_log /usr/local/squid/logs/cache.log cache_store_log /usr/local/squid/logs/store.log logformat logluciano IP do cliente: %>a - Username: %un - Horario: [%tl] - Metodo: %rm - URL: %ru - Status HTTP: %Hs - Status Squid: %Ss - Porta: %>p cache_access_log /usr/local/squid/logs/logteste.log logluciano auth_param ntlm program /usr/bin/ntlm_auth domain/pdc --helper-protocol=squid-2.5-ntlmssp auth_param ntlm children 5 auth_param basic children 5 auth_param basic realm Digite o LOGIN/SENHA auth_param basic credentialsttl 1 minute auth_param basic casesensitive off external_acl_type nt_group %LOGIN /usr/local/squid/etc/wbinfo_group.pl acl AllowedWindowsGroups external nt_group testnet http_access allow AllowedWindowsGroups acl localhost src 127.0.0.1/255.255.255.255 acl redelocal src 192.168.1.0/24 acl SSL_ports port 443 563 acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 563 # https, snews acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http acl Safe_ports port 6959 #mirc acl Safe_ports port 900 #mirc acl Safe_ports port 23 #smtp acl Safe_ports port 143 #imap acl CONNECT method CONNECT acl acesso proxy_auth REQUIRED http_access deny !Safe_ports http_access deny CONNECT !SSL_ports http_access allow acesso http_access allow redelocal
For what it's worth, you are allowing unauthenticated requests from your local network. Authentication is requested, the client is allowed if authentication is provided (but not denied if it's not). The next step checks the client's source IP and allows based on that (with an implicit deny following). Perhaps that's to plan, but I thought it might be worth a mention.
icp_access allow all debug_options ALL,1 33,2 thank's.
Chris