Replying to myself.

It looks like working well the idea to drop traffic
outgoing to the 3128 port for examination purposes

Regards

Giorgio

Here below the diff patch

********************************
--- old/debian-edu-update-netblock      2017-03-17 11:39:46.265624382 +0100
+++ new/debian-edu-update-netblock      2017-03-17 11:45:28.708776912 +0100
@@ -88,7 +88,9 @@
     # cycles ... but don't overdo it ;)
 
     for subnet in $localnet $privatenet $internalnet ; do
-       echo "-A OUTPUT -d $subnet -j ACCEPT" >> $filterfile
+    # Add web proxy netblock before general ACCEPT on OUTPUT chain
+        echo "-A OUTPUT -d $subnet -p tcp --dport 3128 -j DROP" >> $filterfile
+        echo "-A OUTPUT -d $subnet -j ACCEPT" >> $filterfile
     done
 
     for user in $privilegedusers ; do

************************************






On Tue, Mar 14, 2017 at 02:49:49PM +0100, Giorgio Pioda wrote:
> Hi,
> 
> in the past I usually used the NIS netblock group
> combined with a temporary switch off of the squid server
> to provide isolated machines for the practical
> IT examinations.
> 
> But with the new firefox policy, switching off squid3
> results in a complete netblock for all the WS and RWS
> since the browser is not any more allowed to get
> direct access to the external network.
> 
> Any idea to circumvent the problem? I can imagine
> that a modified client netblock script that blocks
> IP traffic on tjener:80 would be a better fix.
> 
> Regards
> 
> Giorgio 
> -- 
> Giorgio Pioda - Sysadmin SPSE-Tenero
> Cell +41 79 629 20 63
> Tel  +41 58 468 62 48
> 
> 

-- 
Giorgio Pioda - Sysadmin SPSE-Tenero
Cell +41 79 629 20 63
Tel  +41 58 468 62 48

Reply via email to