Amos Jeffries wrote: > On 29/05/2012 6:12 p.m., Hans Musil wrote: > > Amos Jeffries wrote: > >> On 29.05.2012 08:13, Eliezer Croitoru wrote: > >>> hey there Hans, > >>> > >>> are you serving squid on the same machine as the gateway is?(wasnt > >>> sure about the DNAT). > >>> your problem is not directly related to squid but to the way that tcp > >>> and browsers works. > >>> for every connection that the client browser uses exist a tcp windows > >>> that stays alive for a period of time after the page was served. > >>> this will cause to all the connections that was served using port > >>> 3128 to still exist for i think 5 till 10 more minutes or whatever is > >>> your tcp stack settings. > >> > >> While that is true for the TCP details I think HTTP connection > >> behaviour is why that matters. For the TCP timeouts closure to start > >> happening HTTP has to first stop using the connection. > >> > >> iptables NAT only affects SYN packets (ie new connections). So any > >> existing TCP connections made by HTTP WILL continue to operate > >> despite any changes to NAT rules. > >> > >> HTTP persistent connections, CONNECT tunnels and HTTP > >> "streaming"/large objects have no fixed lifetime and several minutes > >> for idle timeout. It is quite common to see client TCP connections > >> lasting whole hours or days with HTTP traffic flow throughout. > >> > >>> > >>> On 28/05/2012 22:34, Hans Musil wrote: > >>>> Hi, > >>>> > >>>> my box is running on Debian Sqeeze, which uses SQUID version > >>>> 2.7.STABLE9, but my problem also seems to affect SQUID version 3.1. > >>>> > >>>> These are the importend lines from my squid.conf: > >>>> > >>>> http_port 3128 transparent > >>>> http_port 3129 transparent > >>>> url_rewrite_program /etc/squid/url_rewrite.php > >>>> > >>>> > >>>> First, I did configure my Linux iptables like this: > >>>> > >>>> # Generated by iptables-save v1.4.8 on Mon May 28 21:04:09 2012 > >>>> *nat > >>>> :PREROUTING ACCEPT [0:0] > >>>> :POSTROUTING ACCEPT [0:0] > >>>> :OUTPUT ACCEPT [0:0] > >>>> -A PREROUTING -i eth1 -p tcp -m tcp --dport 80 -j DNAT > >>>> --to-destination 10.17.0.1:3128 > >>>> COMMIT > >>>> > >>>> and everything works fine. > >>>> > >>>> But when I change the redirect port in the iptables settings from > >>>> 3128 to 3129, Squid behaves strange: My URL rewrite program still > >>>> gets send myport=3128, althought there is definitely no more > >>>> request on this port, but only on 3129. This only affects HTTP > >>>> domains that already have been requested before, i.e. with > >>>> redirection to port 3128, and it works fine again when I do a > >>>> force-reload on my browser. Also, things turn well when waiting > >>>> some minutes. > >>>> > >>>> I suppose there is some strange caching inside Squid that maps the > >>>> HTTP domain to an incoming port. > >> > >> No. There is only an active TCP connection. Multiple HTTP request can > >> arrive on the connection long after you start sending unrelated new > >> connections+requests through other ports. > >> > >> > >> What your helper was passed is the details about the request Squid > >> received. It arrived on a TCP connection which was accepted through > >> Squid port 3128. The fact that you changed the kernel settings after > >> that connection was setup and operating is irrelevant. > >> > >> > >> URL-rewriting is a form of NAT on the URL, but with far worse > >> side-effects than IP-layer NAT and is often a sign of major design > >> mistakes somewhere in the network. Why do you have to re-write in the > >> first place? perhapse we could point you at a simpler more standards > >> compliant setup. > >> > >> Amos > >> > > Thanks Amos. This makes things even clearer. Actually, I'd say that my > > problem is solved with the help of both of you. But well, let's have a > > look on my design. > > > > My goal is to build up an access control mechanism for my client > > machines to the internet. As long as a user has not yet logged in, his > > client box should be completely cut off the internet, not only HTTP. > > > > The login is done by a web interface. This is where I redirect the URL > > rewriting for any web traffic. After the user has logged in, the > > client's HTTP packets will be DNATed to the other squid port in order > > to be regularly proxied. I need the HTTP proxy for logging my users' > > HTTP requests. > > > > Since the users' client machines are out of my control, it is > > important for me that they don't need any special configuration, > > That's why the squid must run in transparent mode. > > Okay. As expected a design problem. The huge problem with transparent > intercept is that the browser is 100% unaware that the proxy exists. As > far as it is concerned the re-written splash page or redirect response > is the actual response to somebody elses domain name (google or your > bank for example). It has zero reason to think that a new TCP connection > is needed for followup requests. Just because the server of that page > replied Connection:close is no reason to expect Squid to pass the > closure on to the client (quite the reverse, Squid will go out of its > way to keep client connections open and re-used). > > > To fit in with your existing config that would be: > > acl port3128 myportname 3128 > deny_info http://your-login.example.com/ port3128 > http_access deny port3128 > > The full details and some other tricks can be found at > http://wiki.squid-cache.org/ConfigExamples/Portal/Splash > > This still hits the DNAT problems. I would suggest finding an > external_acl_type helper that accesses whatever database your login > script is recording client logins with. Using that as the ACL to deny / > bounce new clients to the login page. With that design you can authorize > a client on their initial request and continue using the connection > afterwards. > > NP: I recenty posted to the list a version of the external_acl_type > helper I use myself for exactly this type of portal setup. > > Amos Amos, I'm back. Thanks for your last posting. Your trick with acl, deny_info and http_access was a big help. As far as I understand, the external_acl_type helper needs to decide every few seconds whether a client is logged in or not. With some hundreds of clients, this means hundreds of database lookups per second. That's what I wanted to avoid by flipping the squid port when a user logs in or out, respectively. This way, I only have one iptables rule instead of multiple DB lookups. As far as the DNAT problem, I consider to simply run a "contrack -D" with appropriate -s and -d options from my login/logout script. Hans -- Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir belohnen Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de