On 23 January 2015 at 18:29, Odhiambo Washington <odhiambo@xxxxxxxxx> wrote:
On 23 January 2015 at 17:33, Amos Jeffries <squid3@xxxxxxxxxxxxx> wrote:-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Arggg.. Add --with-nat-devpf to your build options in FreeBSD.On 24/01/2015 3:11 a.m., Odhiambo Washington wrote:
> On 23 January 2015 at 16:53, Amos Jeffries <squid3@xxxxxxxxxxxxx>
> wrote:
>
>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
>>
>> On 24/01/2015 2:47 a.m., Odhiambo Washington wrote:
>>> On 23 January 2015 at 16:40, Amos Jeffries
>>> <squid3@xxxxxxxxxxxxx> wrote:
>>>
>>>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
>>>>
>>>> On 24/01/2015 2:20 a.m., Odhiambo Washington wrote:
>>>>> On 23 January 2015 at 16:07, Amos Jeffries
>>>>> <squid3@xxxxxxxxxxxxx> wrote:
>>>>>
>>>>>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
>>>>>>
>>>>>> On 24/01/2015 1:47 a.m., Yuri Voinov wrote:
>>>>>>>
>>>>>>> Once more. You CANNOT have neither web-server nor
>>>>>>> other service with listening port 80 on the same host
>>>>>>> as transparent Squid proxy. This is one and only reason
>>>>>>> you have looping.
>>>>>>>
>>>>>>
>>>>>> That is not correct. It can be done, but depends on how
>>>>>> the firewall operates and what ruleset is used.
>>>>>>
>>>>>> One has to intercept traffic transiting the machine, but
>>>>>> ignore traffic destined *to* or *from* the local
>>>>>> machines running processes.
>>>>>>
>>>>>>> Look. On my transparent 3.4.11 (which was early 2.7)
>>>>>>> IPFilter redirects 80 port to proxy. My web server on
>>>>>>> the same host listens only 8080, 8088 and 8888 ports.
>>>>>>> No one service except NAT is using 80 port.
>>>>>>>
>>>>>>> And finally I have no looping 4 years.
>>>>>>>
>>>>>>> Obvious, is it?
>>>>>>>
>>>>>>
>>>>>> Maybe there was, maybe there wasn't.
>>>>>>
>>>>>> Squid-2.7 ignored a lot of NAT related errors and even
>>>>>> silently did some Very Bad Things(tm) - none of which
>>>>>> Squid-3.2+ will allow to happen anymore.
>>>>>>
>>>>>>
>>>>>> Odhiambo: I suspect it might be related to your use of
>>>>>> "rdr" firewall rules. In OpenBSD PF at least rdr rules do
>>>>>> not work properly and divert-to rules needs to be used
>>>>>> instead (divert-to can be used for either TPROXY or NAT
>>>>>> Squid listening ports on BSD).
>>>>>>
>>>>>
>>>>>
>>>>> I am thinking Squid-3.2+ is evil :-)
>>>>>
>>>>> Anyway, my PF rules are here : http://pastebin.com/pKv1jN2v
>>>>> And my IPFilter rules are here:
>>>>> http://pastebin.com/JQ77X01H
>>>>>
>>>>> I need to figure out why squid is DENYing all access ..
>>>>>
>>>>
>>>> Can you update me on what the squid -v output is from the
>>>> Squid build you are having issues with pleae?
>>>>
>>>> Amos
>>>>
>>>
>>> root@mail:/usr/src # /opt/squid35/sbin/squid -v Squid Cache:
>>> Version 3.5.1-20150120-r13736 Service Name: squid configure
>>> options: '--prefix=/opt/squid35'
>>> '--enable-removal-policies=lru heap' '--disable-epoll'
>>> '--enable-auth' '--enable-auth-basic=DB NCSA PAM PAM POP3 SSPI'
>>> '--enable-external-acl-helpers=session unix_group file_userip'
>>> '--enable-auth-negotiate=kerberos' '--with-pthreads'
>>> '--enable-storeio=ufs diskd rock aufs' '--enable-delay-pools'
>>> '--enable-snmp' '--with-openssl=/usr' '--enable-forw-via-db'
>>> '--enable-cache-digests' '--enable-wccpv2'
>>> '--enable-follow-x-forwarded-for' '--with-large-files'
>>> '--enable-large-cache-files' '--enable-esi' '--enable-kqueue'
>>> '--enable-icap-client' '--enable-kill-parent-hack'
>>> '--enable-ssl' '--enable-leakfinder' '--enable-ssl-crtd'
>>> '--enable-url-rewrite-helpers' '--enable-xmalloc-statistics'
>>> '--enable-stacktraces' '--enable-zph-qos' '--enable-eui'
>>> '--enable-pf-transparent' 'CC=clang' 'CXX=clang++'
>>> --enable-ltdl-convenience
>>>
>>
>> Okay. Can you explicitly add --disable-ipf-transparent -
>> --disable-ipfw-transparent and see if that helps.
>>
>> Also in squid.conf adding debugs_options ALL,1 89,9 will show
>> just the NAT lookup results where things are going wrong.
>>
>
> So, before I recompile, we can look at the debug output:
>
> 2015/01/23 17:07:45| storeLateRelease: released 0 objects
> 2015/01/23 17:07:46.959| Intercept.cc(362) Lookup: address BEGIN:
> me/client= 192.168.2.254:13128, destination/me=
> 192.168.2.115:58632 2015/01/23 17:07:46.959| Intercept.cc(293)
> PfInterception: address NAT divert-to: local=192.168.2.254:13128
> remote=192.168.2.115:58632 FD 14 flag s=33
http://www.squid-cache.org/Versions/v3/3.4/RELEASENOTES.html#ss2.4
Amos
Done that and now, debug shows:2015/01/23 18:15:47.498| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585412015/01/23 18:15:47.498| Intercept.cc(337) PfInterception: address NAT: local=190.93.244.112:80 remote=192.168.2.2:58541 FD 35 flags=332015/01/23 18:15:47.500| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585422015/01/23 18:15:47.500| Intercept.cc(337) PfInterception: address NAT: local=190.93.244.112:80 remote=192.168.2.2:58542 FD 37 flags=332015/01/23 18:15:47.501| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585432015/01/23 18:15:47.501| Intercept.cc(337) PfInterception: address NAT: local=190.93.244.112:80 remote=192.168.2.2:58543 FD 39 flags=332015/01/23 18:15:48.033| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585442015/01/23 18:15:48.033| Intercept.cc(337) PfInterception: address NAT: local=196.0.3.114:80 remote=192.168.2.2:58544 FD 51 flags=332015/01/23 18:15:48.033| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585452015/01/23 18:15:48.033| Intercept.cc(337) PfInterception: address NAT: local=108.168.145.227:80 remote=192.168.2.2:58545 FD 52 flags=332015/01/23 18:15:48.034| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585462015/01/23 18:15:48.034| Intercept.cc(337) PfInterception: address NAT: local=108.168.145.227:80 remote=192.168.2.2:58546 FD 53 flags=332015/01/23 18:15:48.034| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585472015/01/23 18:15:48.034| Intercept.cc(337) PfInterception: address NAT: local=108.168.145.227:80 remote=192.168.2.2:58547 FD 54 flags=332015/01/23 18:15:48.035| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:585482015/01/23 18:15:48.035| Intercept.cc(337) PfInterception: address NAT: local=108.168.145.227:80 remote=192.168.2.2:58548 FD 55 flags=332015/01/23 18:15:48.035| Intercept.cc(362) Lookup: address BEGIN: me/client= 192.168.2.254:13128, destination/me= 192.168.2.2:58549And the good news is that squid-3.5.1 is now allowing client PCs to browse. Thank you for that.I still have issues to raise (though my small brain is now so saturated):Here is what I use:./configure --prefix=/opt/squid35 \--enable-removal-policies="lru heap" \--disable-epoll \--enable-auth \--enable-auth-basic="DB NCSA PAM PAM POP3 SSPI" \--enable-external-acl-helpers="session unix_group file_userip" \--enable-auth-negotiate="kerberos" \--with-pthreads \--enable-storeio="ufs diskd rock aufs" \--enable-delay-pools \--enable-snmp \--with-openssl=/usr \--enable-forw-via-db \--enable-cache-digests \--enable-wccpv2 \--enable-follow-x-forwarded-for \--with-large-files \--enable-large-cache-files \--enable-esi \--enable-kqueue \--enable-icap-client \--enable-kill-parent-hack \--enable-ssl \--enable-leakfinder \--enable-ssl-crtd \--enable-url-rewrite-helpers \--enable-xmalloc-statistics \--enable-stacktraces \--enable-zph-qos \--enable-eui \--with-nat-devpf \--enable-pf-transparent \--enable-ipf-transparentIt seems I have to remove --enable-ipf-transparent otherwise the build fails. I was thinking I could have both of --enable-ipf-transparent and --enable-ipf-transparent so that I can be able to use either PF or IPFilter - whichever I want.
To simplify:
Suppose I wanted to use IPFilter as the Firewall with IPNat, what are my options?
Best regards,
Odhiambo WASHINGTON,
Nairobi,KE
+254733744121/+254722743223
"I can't hear you -- I'm using the scrambler."
Odhiambo WASHINGTON,
Nairobi,KE
+254733744121/+254722743223
"I can't hear you -- I'm using the scrambler."
_______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users