Search squid archive

Re: TCP_DENIED/407 CONNECT www,evernote.com:443

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 10 Mar 2010 15:51:18 +0000, Nick Cairncross
<Nick.Cairncross@xxxxxxxxxxxxxxx> wrote:
> Hi All,
> 
> I have some Mac clients/services that require internet via my Squid. Two
> such programs are Evernote and VMWare. Both are requesting access and
both
> are being denied. The errors I see in the access.log are as follows and
> nothing else:
> 
> 268234226.935      0 172.16.0.38 TCP_DENIED/407 2117 CONNECT
> www.evernote.com:443 - NONE/- text/html
> 1268234226.938      0 172.16.0.38 TCP_DENIED/407 2117 CONNECT
> www.evernote.com:443 - NONE/- text/html
> 1268234228.667      0 172.16.0.38 TCP_DENIED/407 2134 CONNECT
> softwareupdate.vmware.com:443 - NONE/- text/html
> 
> I've tried all sorts of the acls (browser, dstdomain, IP) but I still
get
> denied. Even http_access allow all doesn't work.

Something in your config requires authentication.

> 
> Thanks in advance,
> 
> Nick
> ==
> 
> My configuration is as follows:
> 
...
> #### ACCESS CONTROL LISTS #####
> ## USER-AGENT (Browser-type) ACLs
> acl Java_jvm browser "/etc/squid/ACL/USERAGENTS/USER-AGENTS_JAVA.txt"
> acl iTunes browser "/etc/squid/ACL/USERAGENTS/USER-AGENTS_ITUNES.txt"
> 
> ## URL DESTINATION ACLs
> 
> ## USER AUTHENTICATION ACLs
> acl AuthenticatedUsers proxy_auth REQUIRED
> acl BandwidthUserExceptions proxy_auth_regex -i
> "/etc/squid/ACL/BANDWIDTH/BANDWIDTH_NOLIMIT_USER.txt"
> 
> ## LAN IP ACLs
> acl 172SUBNETS src 172.16.0.0/255.255.0.0
> acl SERVERSUBNETS src 172.16.10.0/255.255.255.0
> acl DoNotAuthenticateIP src "/etc/squid/ACL/IPADDRESSES/IP_NOAUTH.txt"
> 
> ## LOCALHOST ACLs
> acl localhost src 127.0.0.1/255.255.255.255
> acl to_localhost dst 127.0.0.0/8
> 
> ## QUERY ACLs
> acl QUERY urlpath_regex cgi-bin \?
> acl apache rep_header Server ^Apache
> 
> ## SEND DIRECT ACLs
> acl SENDDIRECT_DstDomains dstdomain
> "/etc/squid/ACL/SENDDIRECT/SENDDIRECT_DSTDOMAINS.txt"
> acl SENDDIRECT_Users proxy_auth_regex -i
> "/etc/squid/ACL/SENDDIRECT/SENDDIRECT_USERS.txt"
> acl SENDDIRECT_IPAddresses src
> "/etc/squid/ACL/SENDDIRECT/SENDDIRECT_IPADDRESSES.txt"
> 
> ## BLACKLISTED (Deny) ACLs
> acl BLACKLIST_DstDomains dstdomain
> "/etc/squid/ACL/BLACKLIST/BLACKLIST_DSTDOMAINS.txt"
> acl BLACKLIST_Users proxy_auth_regex -i
> "/etc/squid/ACL/BLACKLIST/BLACKLIST_USERS.txt"
> acl BLACKLIST_IPAddresses src
> "/etc/squid/ACL/BLACKLIST/BLACKLIST_IPADDRESSES.txt"
> 
> ## FILE TYPE ACLs
> acl FILEEXT_EXE urlpath_regex .exe$
> acl FILEEXT_EXE_Users proxy_auth_regex -i
> "/etc/squid/ACL/FILES/FILEEXT_EXE_ALLOWUSERS.txt"
> acl FILEEXT_EXE_DstDomains dstdomain
> "/etc/squid/ACL/FILES/FILEEXT_EXE_ALLOWDSTDOMAINS.txt"
> acl FILEEXT_EXE_IPAddresses src
> "/etc/squid/ACL/FILES/FILEEXT_EXE_ALLOWIPADDRESSES.txt"
> 
...
> # CONNECTION METHOD ACL
> acl CONNECT method CONNECT
> acl POST method POST
> 
> ######  ACCESS RULES  #####
> 
> ### GLOBAL BLACKLIST RULES ###
> http_access deny BLACKLIST_Users

The above rule requires login to work. It will challenge.

> http_access deny BLACKLIST_IPAddresses
> http_access deny BLACKLIST_DstDomains
> ############################
> 
...
> # USER AGENTS #
> http_access allow iTunes
> http_access allow Java_jvm
> 
> # URL DESTINATIONS
...
> ## POST and CONNECT ALLOW ##
> http_access allow POST

Why is post being allowed to unrestricted? I think there might be some
additional restrictions you want to add there. Perhapse the LAN IP range or
something.

> http_access allow CONNECT

I really do recommend "deny CONNECT !SSL_ports" to prevent malicious or
infected clients abusing things. Malware can do login too.

> 
> ## USERS ACL ALLOW ##
> # Emergency Allow All unhash this for instant access to all without
> authentication
> #http_access allow all
> http_access allow DoNotAuthenticateIP
> http_access allow AuthenticatedUsers
> http_reply_access allow AuthenticatedUsers
> 
> ## LOCAL HOST ALLOW ##
> http_access allow localhost
>
...
> ###### CATCH ALL DENY ######
> http_access deny !Safe_ports
> http_access deny CONNECT !SSL_ports
> http_access deny to_localhost

The above are not catch-all. They are basic security foundations/blanket
that need to be checked as early as possible to prevent major causes of
abuse.

> http_access deny 172SUBNETS

The real catch-all is this:
  http_access deny all



Amos

[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux