Hermidio A. Rodriguez Chavez escribió:
> Jenny Cabrera Varona escribió:
>
>> si hago eso el squid me muestra todas las conexines como que las esta
>> haciendo el mismo server en esa direccion o sea una peticion hecha a
>> http://www,google.com.cu estaria hecha por el mismo server, o sea que no
>> me permite ver quien esta haciendo realmente las peticiones, pero ya te
>> digo, eso es solo en los logs del squid, porque el dansguardian si me da
>> los reportes correctos ok, mi unico problema al poner al squid a
>> escuchar por 127.0.0.1:3128 son los delay pool, porque los logs los veo
>> por el dansguardian sin problemas ....
>>
>> =========================================
>> Sistema de Correos
>> Nodo Geominera Camaguey
>> Mensaje Analizado con AVG Antivirus
>> =========================================
>>
>>
>> _______________________________________________
>> Cancelar suscripción
>> https://listas.softwarelibre.cu/mailman/listinfo/linux-l
>> Buscar en el archivo
>> http://listas.softwarelibre.cu/buscar/linux-l
>>
>>
>>
> Te repito si tu squid solo te muetsra la ip del servidor que tiene el
> filtro nunca te van a funcionar las delay pools a menos que se las
> apliques a ese servidor.
>
> Saludos
>
> Hermidio
>
>
> _______________________________________________
> Cancelar suscripción
> https://listas.softwarelibre.cu/mailman/listinfo/linux-l
> Buscar en el archivo
> http://listas.softwarelibre.cu/buscar/linux-l
>
>
necesitas un parche para squid para que el dansguardian que tiene una
opción de forwardear las ip de los usuarios cuando se conectan al squid
y así este no se afectaría por el problema que tienes, necesitas poner
ese parche y compilar squid con la opción: X-Forwarded-For,
# TAG: forwarded_for on|off
# If set, Squid will include your system's IP address or name
# in the HTTP requests it forwards. By default it looks like
# this:
#
# X-Forwarded-For: 192.1.2.3
#
# If you disable this, it will appear as
#
# X-Forwarded-For: unknown
#
#Default:
# forwarded_for on
# TAG: forward_log
# Note: This option is only available if Squid is rebuilt with the
# -DWIP_FWD_LOG option
#
# Logs the server-side requests.
#
# This is currently work in progress.
#
#Default:
# none
--enable-follow-x-forwarded-for
Enable support for following the X-Forwarded-For
HTTP header to try to find the IP address of the
original or indirect client when a request has
been forwarded through other proxies.
# OPTIONS FOR X-Forwarded-For
#
-----------------------------------------------------------------------------
# TAG: follow_x_forwarded_for
# Allowing or Denying the X-Forwarded-For header to be followed to
# find the original source of a request.
#
# Requests may pass through a chain of several other proxies
# before reaching us. The X-Forwarded-For header will contain a
# comma-separated list of the IP addresses in the chain, with the
# rightmost address being the most recent.
#
# If a request reaches us from a source that is allowed by this
# configuration item, then we consult the X-Forwarded-For header
# to see where that host received the request from. If the
# X-Forwarded-For header contains multiple addresses, and if
# acl_uses_indirect_client is on, then we continue backtracking
# until we reach an address for which we are not allowed to
# follow the X-Forwarded-For header, or until we reach the first
# address in the list. (If acl_uses_indirect_client is off, then
# it's impossible to backtrack through more than one level of
# X-Forwarded-For addresses.)
#
# The end result of this process is an IP address that we will
# refer to as the indirect client address. This address may
# be treated as the client address for access control, delay
# pools and logging, depending on the acl_uses_indirect_client,
# delay_pool_uses_indirect_client and log_uses_indirect_client
# options.
#
# SECURITY CONSIDERATIONS:
#
# Any host for which we follow the X-Forwarded-For header
# can place incorrect information in the header, and Squid
# will use the incorrect information as if it were the
# source address of the request. This may enable remote
# hosts to bypass any access control restrictions that are
# based on the client's source addresses.
#
# For example:
#
# acl localhost src 127.0.0.1
# acl my_other_proxy srcdomain .proxy.example.com
# follow_x_forwarded_for allow localhost
# follow_x_forwarded_for allow my_other_proxy
#
#Default:
# follow_x_forwarded_for deny all
Si necesitas un .deb ya compilado con todo esto, escribirme al privado.
Salu2
Para más información www.google.com.cu.
--
______________________________________________
Arian Molina Aguilera
Administrador de Redes y Servicios Telemáticos
Linux Usuario Registrado #392892
Telfs: (5347)861200 Ext 295, (5347)861294
jabber: [EMAIL PROTECTED]
Visitenos en http://www.eiefd.co.cu
EIEFD La Habana. Cuba.
_______________________________________________
Cancelar suscripción
https://listas.softwarelibre.cu/mailman/listinfo/linux-l
Buscar en el archivo
http://listas.softwarelibre.cu/buscar/linux-l