On Wednesday 14 December 2016 at 16:16:17, Sameh Onaissi wrote:
Looking at access.log, to find the Skype IPs, I noticed a LOT of unknown
source IPs. All those IPs seem to be originated from China. In my config
file I deny all but local net IPs 10.0.0.0/24.
I suggest you show us your squid.conf (wiithout comments or blank lines)
because you do not seem to have achieved restricting source IPs as intended.
Here is a sample of the log:
1481728035.855 0 199.233.237.186 TAG_NONE/400 4534 NONE
error:invalid-request - HIER_NONE/- text/html 1481728035.952 1556
118.89.21.244 TCP_MISS/200 445 POST http://online.huya.com/ -
HIER_DIRECT/183.61.6.181 application/multipart-formdata 1481728036.461
595
123.207.123.80 TCP_MISS/200 419 POST http://online.huya.com/ -
HIER_DIRECT/183.61.6.181 application/multipart-formdata 1481728036.993
749
123.207.123.80 TCP_MISS/200 819 POST http://wup.huya.com/ -
HIER_DIRECT/180.208.65.100 application/multipart-formdata 1481728037.538
2307
122.227.189.214 TCP_MISS/200 764 POST
http://webim.ganji.com/message/ImSendMsg? - HIER_DIRECT/124.251.6.233
text/html 1481728038.572 9372
74.222.20.124 TCP_MISS/502 3922 GET
http://116.31.99.233:9636/ -
HIER_DIRECT/116.31.99.233 text/html 1481728038.573 0
74.222.20.124 TAG_NONE/400 4532 NONE error:invalid-request - HIER_NONE/-
text/html 1481728038.773 2528
118.89.21.244 TCP_MISS/200 419 POST http://online.huya.com/ -
HIER_DIRECT/183.61.6.181 application/multipart-formdata 1481728039.162
1575
139.199.60.36 TCP_MISS/200 419 POST http://online.huya.com/ -
HIER_DIRECT/183.61.6.181 application/multipart-formdata 1481728039.203
612
122.227.189.214 TCP_MISS/200 1182 POST
http://mobapi.ganji.com/datashare/ -
HIER_DIRECT/115.159.231.182 text/html 1481728039.615 51681
172.82.184.19 TCP_MISS/502 3806 GET
http://115.231.17.12:9636/ -
HIER_DIRECT/115.231.17.12 text/html 1481728039.615 0
172.82.184.19 TAG_NONE/400 4532 NONE
error:invalid-request - HIER_NONE/- text/html 1481728040.311 36606
74.222.20.124 TCP_MISS/502 3806 GET
http://116.31.99.233:9636/ -
HIER_DIRECT/116.31.99.233 text/html 1481728040.312 0
74.222.20.124 TAG_NONE/400 4532 NONE error:invalid-request - HIER_NONE/-
text/html 1481728041.477 67001
74.222.19.19 TCP_MISS/502 3802 GET http://61.155.5.197:9636/ -
HIER_DIRECT/61.155.5.197 text/html 1481728041.478 0
74.222.19.19 TAG_NONE/400 4531 NONE error:invalid-request - HIER_NONE/-
text/html 1481728041.856 13613
172.82.190.245 TCP_MISS/502 3926 GET
http://122.226.191.17:9636/ -
HIER_DIRECT/122.226.191.17 text/html 1481728041.857 0
172.82.190.245 TAG_NONE/400 4533 NONE error:invalid-request - HIER_NONE/-
text/html
I am worried about spam…
I would not call this spam - I would call it "people trying to abuse your
proxy".
is this normal?
It is normal that they try. It is not normal that your access control rules
allow them to get this far.
if not, how can I know what is accessing squid and stop it.
You don't care what is accessing it - you only care that it's coming from the
outside, and that should not be allowed. Either or both of your Squid ACLs
and your firewall rules need to be reviewed.
NOTE: this server has a small iRedMail server installed on it.
What port/s does that listen on? It is intended to be externally accessible?
Regards,
Antony.
--
Wanted: telepath. You know where to apply.
Please reply to the list;
please *don't* CC me.
_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users