Enviado em 03/03/2009 - 17:27h
Olá pessoal, preciso da ajuda de vcs...Estou tendo problemas com a bendita conectividade social. Ja implementei varias regras e nada. Mais ao utilizar o tcpdump, verifiquei q o trafego para internet está passando todo pela porta 80, e nao pela 3128. Meu proxy (squid) é transparente, e no firewal, tenho as regras de redirecionamento da porta 80 para 3128. Me deem uma ajuda por favor. Valeu!
Segue abaixo meu firewal:
transparent_squid "3128" "squid proxy" inface "eth0+" src "192.168.1.4/24"
# Com CNS - Conectividade social da CAIXA
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.174.0/24 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.174.207 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.173/24 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.174.207 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.173.68/24 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 192.168.1.4 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 192.168.1.61 --dport 80 -j REDIRECT --to-port 3128
#Testes de regras
#iptables -t nat -I PREROUTING -p tcp -d 200.201.0.0/16 -j ACCEPT
#iptables -t nat -I PREROUTING -p tcp -d 200.223.0.0 -j ACCEPT
#iptables -I FORWARD -p tcp -d 200.201.0.0/16 -j ACCEPT
#iptables -I FORWARD -p tcp -d 200.223.0.0 -j ACCEPT
#iptables -I FORWARD -s 192.168.1.0/24 -d 200.201.174.207 -j ACCEPT
#iptables -I FORWARD -s 200.201.174.207 -d 192.168.1.0/24 -j ACCEPT
##############Testes de regras caixa#######################
##############Permitir retorno###########################
#iptables -I FORWARD -s 192.168.1.0/24 -d obsupgdp.caixa.gov.br -j ACCEPT
#iptables -I FORWARD -s obsupgdp.caixa.gov.br -d 192.168.1.0/24 -j ACCEPT
#Regras para liberar portas da conectividade social - Caixa
#iptables -t nat -A POSTROUTING -o "eth0+" -m multiport -p tcp --dports 443,2631 -j MASQUERADE
#Regras para bloqueio bate papo Gmail
#CHAT GMAIL
iptables -I INPUT -s chatenabled.mail.google.com -j DROP
iptables -A OUTPUT -d chatenabled.mail.google.com -j DROP
iptables -I FORWARD -s 0/0 -d chatenabled.mail.google.com -j DROP
iptables -I INPUT -s b.mail.google.com -j DROP
iptables -A OUTPUT -d b.mail.google.com -j DROP
iptables -I FORWARD -s 0/0 -d b.mail.google.com -j DROP
#Regras para bloqueio MSN
iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 1863 -j REJECT
iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 5190 -j REJECT
######Testes Bloqueio Porta 80#############
#iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 80 -j DROP
#iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 5190 -j REJECT
#Liberar MSN Ip especifico
#iptables -I FORWARD -s 192.168.1.64 -p tcp --dport 1863 -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d loginnet.password.com -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d hotmail.com -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d hotmail.com.br -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d login.live.com -j ACCEPT
#iptables -A FORWARD -s 192.168.1.64 -d messenger.hotmail.com -j ACCEPT
#iptables -A FORWARD -s 192.168.1.64 -d webmessenger.msn.com -j ACCEPT
#Regra bloqueio Meebo
iptables -A FORWARD -d meebo.com -p tcp --dport 443 -j DROP
iptables -A INPUT -d meebo.com -p tcp --dport 443 -j DROP
iptables -A FORWARD -d meebo.com -p tcp --dport 443 -j REJECT
iptables -A FORWARD -d wwwm.meebo.com -p tcp --dport 443 -j REJECT
iptables -A FORWARD -d 69.36.250.253 -p tcp --dport 443 -j REJECT
iptables -A FORWARD -d 64.91.231.209 -p tcp --dport 443 -j REJECT
# Sem CNS
iptables -t nat -A PREROUTING -i "eth0+" -p tcp --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i eth0 -p tcp -d ! obsupgdp.caixa.gov.br --dport 80 -j REDIRECT --to-port 3128
modprobe iptable_nat
iptables -t nat -A POSTROUTING -o "eth1" -j MASQUERADE
echo 1 > /proc/sys/net/ipv4/ip_forward
interface eth1 internet src not "${UNROUTABLE_IPS}"
policy drop
protection strong 10/sec 10
server netbios_dgm drop
server https accept
server jabber accept
server ftp accept
## server webmin drop
server http accept
server pop3 accept
server imap accept
server smtp accept
server caixa accept
server dns accept
##server ssh accept
client all accept
interface eth0+ lan
policy reject
server dns accept
server ssh accept
server http accept
server https accept
server ftp accept
server dhcp accept
server squid accept
server samba accept
server caixa accept
server mysql accept
server webmin accept
server jabber accept
server ntp accept
server pop3 accept
server imap accept
server smtp accept
server caixa accept
## server icmp drop
server dns accept
## server nfs accept
client all accept
router lan2_net inface "eth0+" outface "eth1"
route all accept
Segue abaixo meu firewal:
transparent_squid "3128" "squid proxy" inface "eth0+" src "192.168.1.4/24"
# Com CNS - Conectividade social da CAIXA
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.174.0/24 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.174.207 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.173/24 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.174.207 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 200.201.173.68/24 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 192.168.1.4 --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i "eth0+" -p tcp -d! 192.168.1.61 --dport 80 -j REDIRECT --to-port 3128
#Testes de regras
#iptables -t nat -I PREROUTING -p tcp -d 200.201.0.0/16 -j ACCEPT
#iptables -t nat -I PREROUTING -p tcp -d 200.223.0.0 -j ACCEPT
#iptables -I FORWARD -p tcp -d 200.201.0.0/16 -j ACCEPT
#iptables -I FORWARD -p tcp -d 200.223.0.0 -j ACCEPT
#iptables -I FORWARD -s 192.168.1.0/24 -d 200.201.174.207 -j ACCEPT
#iptables -I FORWARD -s 200.201.174.207 -d 192.168.1.0/24 -j ACCEPT
##############Testes de regras caixa#######################
##############Permitir retorno###########################
#iptables -I FORWARD -s 192.168.1.0/24 -d obsupgdp.caixa.gov.br -j ACCEPT
#iptables -I FORWARD -s obsupgdp.caixa.gov.br -d 192.168.1.0/24 -j ACCEPT
#Regras para liberar portas da conectividade social - Caixa
#iptables -t nat -A POSTROUTING -o "eth0+" -m multiport -p tcp --dports 443,2631 -j MASQUERADE
#Regras para bloqueio bate papo Gmail
#CHAT GMAIL
iptables -I INPUT -s chatenabled.mail.google.com -j DROP
iptables -A OUTPUT -d chatenabled.mail.google.com -j DROP
iptables -I FORWARD -s 0/0 -d chatenabled.mail.google.com -j DROP
iptables -I INPUT -s b.mail.google.com -j DROP
iptables -A OUTPUT -d b.mail.google.com -j DROP
iptables -I FORWARD -s 0/0 -d b.mail.google.com -j DROP
#Regras para bloqueio MSN
iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 1863 -j REJECT
iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 5190 -j REJECT
######Testes Bloqueio Porta 80#############
#iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 80 -j DROP
#iptables -A FORWARD -s 192.168.1.0/24 -p tcp --dport 5190 -j REJECT
#Liberar MSN Ip especifico
#iptables -I FORWARD -s 192.168.1.64 -p tcp --dport 1863 -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d loginnet.password.com -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d hotmail.com -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d hotmail.com.br -j ACCEPT
#iptables -I FORWARD -s 192.168.1.64 -d login.live.com -j ACCEPT
#iptables -A FORWARD -s 192.168.1.64 -d messenger.hotmail.com -j ACCEPT
#iptables -A FORWARD -s 192.168.1.64 -d webmessenger.msn.com -j ACCEPT
#Regra bloqueio Meebo
iptables -A FORWARD -d meebo.com -p tcp --dport 443 -j DROP
iptables -A INPUT -d meebo.com -p tcp --dport 443 -j DROP
iptables -A FORWARD -d meebo.com -p tcp --dport 443 -j REJECT
iptables -A FORWARD -d wwwm.meebo.com -p tcp --dport 443 -j REJECT
iptables -A FORWARD -d 69.36.250.253 -p tcp --dport 443 -j REJECT
iptables -A FORWARD -d 64.91.231.209 -p tcp --dport 443 -j REJECT
# Sem CNS
iptables -t nat -A PREROUTING -i "eth0+" -p tcp --dport 80 -j REDIRECT --to-port 3128
#iptables -t nat -A PREROUTING -i eth0 -p tcp -d ! obsupgdp.caixa.gov.br --dport 80 -j REDIRECT --to-port 3128
modprobe iptable_nat
iptables -t nat -A POSTROUTING -o "eth1" -j MASQUERADE
echo 1 > /proc/sys/net/ipv4/ip_forward
interface eth1 internet src not "${UNROUTABLE_IPS}"
policy drop
protection strong 10/sec 10
server netbios_dgm drop
server https accept
server jabber accept
server ftp accept
## server webmin drop
server http accept
server pop3 accept
server imap accept
server smtp accept
server caixa accept
server dns accept
##server ssh accept
client all accept
interface eth0+ lan
policy reject
server dns accept
server ssh accept
server http accept
server https accept
server ftp accept
server dhcp accept
server squid accept
server samba accept
server caixa accept
server mysql accept
server webmin accept
server jabber accept
server ntp accept
server pop3 accept
server imap accept
server smtp accept
server caixa accept
## server icmp drop
server dns accept
## server nfs accept
client all accept
router lan2_net inface "eth0+" outface "eth1"
route all accept