mcafeehasser
Goto Top

Squid Netzwerkproblem

Hallo,
.
ich baue gerade eine SBS 2011 Standard Umgebung auf und als Proxy soll der Squid 2.7 für Windows seine Dienste tun.

Nun habe ich das Problem, dass die Clients keine Verbindung zum Squid aufbauen. Am DC, wo der Squid auch läuft, funktioniert der Zugriff.

Wenn ich die Access.log Datei durchforste, sehe ich ausschliesslich die Zugriffe des DC, von den Clients taucht keine einzige IP auf.

Die Clients sind in der Domäne, DNS funktioniert, NSLOOKUP auf z.B. www.heise.de wird sauber vom DC aufgelöst.

Die IP Range ist eine Standard 192.168.x.x/24.

In den Webbrowsern IE&FF ist der Squid eingetragen mit Port 3128. Hierzu habe ich u.a. auch einen DNS Eintrag angelegt, der auf den Clients
problemlos mit Ping abgefragt werden kann, auch wenn die IP dort eingetragen wird hilft dies nicht.

Da die generelle Verbindung nach aussen scheinbar funktioniert, aber nur die HTTP Anfrage scheinbar nicht den Squid erreicht bin ich aktuell etwas
planlos, was das noch sein könnte.

Windows Firewall kann man ausschliessen, die habe ich zumindest an einem Client komplett deaktivert.

Bin für jeden Hinweis dankbar face-smile

Grüsse

Content-Key: 178195

Url: https://administrator.de/contentid/178195

Ausgedruckt am: 28.03.2024 um 10:03 Uhr

Mitglied: Dani
Dani 29.12.2011 um 18:42:40 Uhr
Goto Top
Hallo,
wie sieht deine Squid-Konfiguration aus?


Grüße,
Dani
Mitglied: mcafeehasser
mcafeehasser 30.12.2011 um 10:29:12 Uhr
Goto Top
Hallo Dani,

ich habe die Squid.Conf relativ nach Standard konfiguriert. Da man keine Dateien anhängen kann mal der Text ab den ACL bis zur letzten Änderungsstelle von mir.
Da die ACL Localnet im Endeffekt mein Netz abdeckt, habe ich keine extra ACL fürs Netzwerk gemacht.
acl all src all
acl manager proto cache_object
acl localhost src 127.0.0.1/32
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32


#
# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8	# RFC1918 possible internal network
acl localnet src 172.16.0.0/12	# RFC1918 possible internal network
acl localnet src 192.168.0.0/16	# RFC1918 possible internal network
#
acl SSL_ports port 443
acl Safe_ports port 80		# http
acl Safe_ports port 8080	# http2
acl Safe_ports port 21		# ftp
acl Safe_ports port 443		# https
acl Safe_ports port 70		# gopher
acl Safe_ports port 210		# wais
#acl Safe_ports port 1025-65535	# unregistered ports
acl Safe_ports port 280		# http-mgmt
acl Safe_ports port 488		# gss-http
acl Safe_ports port 591		# filemaker
acl Safe_ports port 777		# multiling http
acl Safe_ports port 3000	# Star Money
acl Safe_ports port 1080	# Star Money
acl CONNECT method CONNECT

#  TAG: http_access
#	Allowing or Denying access based on defined access lists
#
#	Access to the HTTP port:
#	http_access allow|deny [!]aclname ...
#
#	NOTE on default values:
#
#	If there are no "access" lines present, the default is to deny  
#	the request.
#
#	If none of the "access" lines cause a match, the default is the  
#	opposite of the last line in the list.  If the last line was
#	deny, the default is allow.  Conversely, if the last line
#	is allow, the default will be deny.  For these reasons, it is a
#	good idea to have an "deny all" or "allow all" entry at the end  
#	of your access lists to avoid potential confusion.
#
#Default:
# http_access deny all
#
#Recommended minimum configuration:
#
# Only allow cachemgr access from localhost
#http_access allow lokal
http_access allow manager localhost
http_access deny manager


# Deny requests to unknown ports
http_access deny !Safe_ports
# Deny CONNECT to other than SSL ports
http_access deny CONNECT !SSL_ports
#
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user  
#http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS

# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet

# And finally deny all other access to this proxy
http_access deny all

#  TAG: http_access2
#	Allowing or Denying access based on defined access lists
#
#	Identical to http_access, but runs after redirectors. If not set
#	then only http_access is used.
#
#Default:
# none

#  TAG: http_reply_access
#	Allow replies to client requests. This is complementary to http_access.
#
#	http_reply_access allow|deny [!] aclname ...
#
#	NOTE: if there are no access lines present, the default is to allow
#	all replies
#
#	If none of the access lines cause a match the opposite of the
#	last line will apply. Thus it is good practice to end the rules
#	with an "allow all" or "deny all" entry.  
#
#Default:
# http_reply_access allow all

#  TAG: icp_access
#	Allowing or Denying access to the ICP port based on defined
#	access lists
#
#	icp_access  allow|deny [!]aclname ...
#
#	See http_access for details
#
#Default:
# icp_access deny all
#
#Allow ICP queries from local networks only
icp_access allow localnet
icp_access deny all

#  TAG: htcp_access
#	Allowing or Denying access to the HTCP port based on defined
#	access lists
#
#	htcp_access  allow|deny [!]aclname ...
#
#	See http_access for details
#
#	NOTE: The default if no htcp_access lines are present is to
#	deny all traffic. This default may cause problems with peers
#	using the htcp or htcp-oldsquid options.
#
#Default:
# htcp_access deny all
#
#Allow HTCP queries from local networks only
# htcp_access allow localnet
# htcp_access deny all

#  TAG: htcp_clr_access
#	Allowing or Denying access to purge content using HTCP based
#	on defined access lists
#
#	htcp_clr_access  allow|deny [!]aclname ...
#
#	See http_access for details
#
##Allow HTCP CLR requests from trusted peers
#acl htcp_clr_peer src 172.16.1.2
#htcp_clr_access allow htcp_clr_peer
#
#Default:
# htcp_clr_access deny all

#  TAG: miss_access
#	Use to force your neighbors to use you as a sibling instead of
#	a parent.  For example:
#
#		acl localclients src 172.16.0.0/16
#		miss_access allow localclients
#		miss_access deny  !localclients
#
#	This means only your local clients are allowed to fetch
#	MISSES and all other clients can only fetch HITS.
#
#	By default, allow all clients who passed the http_access rules
#	to fetch MISSES from us.
#
#Default setting:
# miss_access allow all

#  TAG: ident_lookup_access
#	A list of ACL elements which, if matched, cause an ident
#	(RFC931) lookup to be performed for this request.  For
#	example, you might choose to always perform ident lookups
#	for your main multi-user Unix boxes, but not for your Macs
#	and PCs.  By default, ident lookups are not performed for
#	any requests.
#
#	To enable ident lookups for specific client addresses, you
#	can follow this example:
#
#	acl ident_aware_hosts src 198.168.1.0/255.255.255.0
#	ident_lookup_access allow ident_aware_hosts
#	ident_lookup_access deny all
#
#	Only src type ACL checks are fully supported.  A src_domain
#	ACL might work at times, but it will not always provide
#	the correct result.
#
#Default:
# ident_lookup_access deny all

#  TAG: reply_body_max_size	bytes deny acl acl...
#	This option specifies the maximum size of a reply body in bytes.
#	It can be used to prevent users from downloading very large files,
#	such as MP3's and movies. When the reply headers are received,  
#	the reply_body_max_size lines are processed, and the first line with
#	a result of "deny" is used as the maximum body size for this reply.  
#	This size is checked twice. First when we get the reply headers,
#	we check the content-length value.  If the content length value exists
#	and is larger than the allowed size, the request is denied and the
#	user receives an error message that says "the request or reply  
#	is too large." If there is no content-length, and the reply  
#	size exceeds this limit, the client's connection is just closed  
#	and they will receive a partial reply.
#
#	WARNING: downstream caches probably can not detect a partial reply
#	if there is no content-length header, so they will cache
#	partial responses and give them out as hits.  You should NOT
#	use this option if you have downstream caches.
#
#	If you set this parameter to zero (the default), there will be
#	no limit imposed.
#
#Default:
# reply_body_max_size 0 allow all

#  TAG: authenticate_ip_shortcircuit_access
#	Access list determining when shortcicuiting the authentication process
#	based on source IP cached credentials is acceptable. Use this to deny
#	using the ip auth cache on requests from child proxies or other source
#	ip's having multiple users.  
#
#	See also authenticate_ip_shortcircuit_ttl directive
#
#Default:
# none


# OPTIONS FOR X-Forwarded-For
# -----------------------------------------------------------------------------

#  TAG: follow_x_forwarded_for
#	Allowing or Denying the X-Forwarded-For header to be followed to
#	find the original source of a request.
#
#	Requests may pass through a chain of several other proxies
#	before reaching us.  The X-Forwarded-For header will contain a
#	comma-separated list of the IP addresses in the chain, with the
#	rightmost address being the most recent.
#
#	If a request reaches us from a source that is allowed by this
#	configuration item, then we consult the X-Forwarded-For header
#	to see where that host received the request from.  If the
#	X-Forwarded-For header contains multiple addresses, and if
#	acl_uses_indirect_client is on, then we continue backtracking
#	until we reach an address for which we are not allowed to
#	follow the X-Forwarded-For header, or until we reach the first
#	address in the list.  (If acl_uses_indirect_client is off, then
#	it's impossible to backtrack through more than one level of  
#	X-Forwarded-For addresses.)
#
#	The end result of this process is an IP address that we will
#	refer to as the indirect client address.  This address may
#	be treated as the client address for access control, delay
#	pools and logging, depending on the acl_uses_indirect_client,
#	delay_pool_uses_indirect_client and log_uses_indirect_client
#	options.
#
#	SECURITY CONSIDERATIONS:
#
#		Any host for which we follow the X-Forwarded-For header
#		can place incorrect information in the header, and Squid
#		will use the incorrect information as if it were the
#		source address of the request.  This may enable remote
#		hosts to bypass any access control restrictions that are
#		based on the client's source addresses.  
#
#	For example:
#
#		acl localhost src 127.0.0.1
#		acl my_other_proxy srcdomain .proxy.example.com
#		follow_x_forwarded_for allow localhost
#		follow_x_forwarded_for allow my_other_proxy
#
#Default:
# follow_x_forwarded_for deny all

#  TAG: acl_uses_indirect_client	on|off
#	Controls whether the indirect client address
#	(see follow_x_forwarded_for) is used instead of the
#	direct client address in acl matching.
#
#Default:
# acl_uses_indirect_client on

#  TAG: delay_pool_uses_indirect_client	on|off
#	Controls whether the indirect client address
#	(see follow_x_forwarded_for) is used instead of the
#	direct client address in delay pools.
#
#Default:
# delay_pool_uses_indirect_client on

#  TAG: log_uses_indirect_client	on|off
#	Controls whether the indirect client address
#	(see follow_x_forwarded_for) is used instead of the
#	direct client address in the access log.
#
#Default:
# log_uses_indirect_client on


# SSL OPTIONS
# -----------------------------------------------------------------------------

#  TAG: ssl_unclean_shutdown
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Some browsers (especially MSIE) bugs out on SSL shutdown
#	messages.
#
#Default:
# ssl_unclean_shutdown off

#  TAG: ssl_engine
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	The OpenSSL engine to use. You will need to set this if you
#	would like to use hardware SSL acceleration for example.
#
#Default:
# none

#  TAG: sslproxy_client_certificate
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Client SSL Certificate to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_client_key
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Client SSL Key to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_version
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	SSL version level to use when proxying https:// URLs
#
#Default:
# sslproxy_version 1

#  TAG: sslproxy_options
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	SSL engine options to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_cipher
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	SSL cipher list to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_cafile
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	file containing CA certificates to use when verifying server
#	certificates while proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_capath
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	directory containing CA certificates to use when verifying
#	server certificates while proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_flags
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Various flags modifying the use of SSL while proxying https:// URLs:
#	    DONT_VERIFY_PEER    Accept certificates even if they fail to
#				verify.
#	    NO_DEFAULT_CA       Don't use the default CA list built in  
#				to OpenSSL.
#
#Default:
# none

#  TAG: sslpassword_program
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Specify a program used for entering SSL key passphrases
#	when using encrypted SSL certificate keys. If not specified
#	keys must either be unencrypted, or Squid started with the -N
#	option to allow it to query interactively for the passphrase.
#
#Default:
# none


# NETWORK OPTIONS
# -----------------------------------------------------------------------------

#  TAG: http_port
#	Usage:	port [options]
#		hostname:port [options]
#		1.2.3.4:port [options]
#
#	The socket addresses where Squid will listen for HTTP client
#	requests.  You may specify multiple socket addresses.
#	There are three forms: port alone, hostname with port, and
#	IP address with port.  If you specify a hostname or IP
#	address, Squid binds the socket to that specific
#	address.  This replaces the old 'tcp_incoming_address'  
#	option.  Most likely, you do not need to bind to a specific
#	address, so you can use the port number alone.
#
#	If you are running Squid in accelerator mode, you
#	probably want to listen on port 80 also, or instead.
#
#	The -I command line option will override the *first* port
#	specified here.
#
#	You may specify multiple socket addresses on multiple lines.
#
#	Options:
#
#	   transparent	Support for transparent interception of
#			outgoing requests without browser settings.
#
#	   tproxy	Support Linux TPROXY for spoofing outgoing
#			connections using the client IP address.
#
#	   accel	Accelerator mode. See also the related vhost,
#			vport and defaultsite directives.
#
#	   defaultsite=domainname
#			What to use for the Host: header if it is not present
#			in a request. Determines what site (not origin server)
#			accelerators should consider the default.
#			Defaults to visible_hostname:port if not set
#			May be combined with vport=NN to override the port number.
#			Implies accel.
#
#	   vhost	Accelerator mode using Host header for virtual
#			domain support. Implies accel.
#
#	   vport	Accelerator with IP based virtual host support.
#			Implies accel.
#
#	   vport=NN	As above, but uses specified port number rather
#			than the http_port number. Implies accel.
#
#	   allow-direct	Allow direct forwarding in accelerator mode. Normally
#	   		accelerated requests is denied direct forwarding as it
#			never_direct was used.
#
#	   urlgroup=	Default urlgroup to mark requests with (see
#			also acl urlgroup and url_rewrite_program)
#
#	   protocol=	Protocol to reconstruct accelerated requests with.
#			Defaults to http.
#
#	   no-connection-auth
#			Prevent forwarding of Microsoft connection oriented
#			authentication (NTLM, Negotiate and Kerberos)
#
#	   act-as-origin
#	   		Act is if this Squid is the origin server.
#			This currently means generate own Date: and
#			Expires: headers. Implies accel.
#
#	   http11	Enables HTTP/1.1 support to clients. The HTTP/1.1
#			support is still incomplete with an internal HTTP/1.0
#			hop, but should work with most clients. The main
#			HTTP/1.1 features missing due to this is forwarding
#			of requests using chunked transfer encoding (results
#			in 411) and forwarding of 1xx responses (silently
#			dropped)
#
#	   name=	Specifies a internal name for the port. Defaults to
#			the port specification (port or addr:port)
#
#	   tcpkeepalive[=idle,interval,timeout]
#			Enable TCP keepalive probes of idle connections
#			idle is the initial time before TCP starts probing
#			the connection, interval how often to probe, and
#			timeout the time before giving up.
#
#	If you run Squid on a dual-homed machine with an internal
#	and an external interface we recommend you to specify the
#	internal address:port in http_port. This way Squid will only be
#	visible on the internal address.
#
# Squid normally listens to port 3128

http_port 3128

#  TAG: https_port
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Usage:  [ip:]port cert=certificate.pem [key=key.pem] [options...]
#
#	The socket address where Squid will listen for HTTPS client
#	requests.
#
#	This is really only useful for situations where you are running
#	squid in accelerator mode and you want to do the SSL work at the
#	accelerator level.
#
#	You may specify multiple socket addresses on multiple lines,
#	each with their own SSL certificate and/or options.
#
#	Options:
#
#	In addition to the options specified for http_port the folling
#	SSL related options is supported:
#
#	   cert=	Path to SSL certificate (PEM format).
#
#	   key=		Path to SSL private key file (PEM format)
#			if not specified, the certificate file is
#			assumed to be a combined certificate and
#			key file.
#
#	   version=	The version of SSL/TLS supported
#			    1	automatic (default)
#			    2	SSLv2 only
#			    3	SSLv3 only
#			    4	TLSv1 only
#
#	   cipher=	Colon separated list of supported ciphers.
#
#	   options=	Various SSL engine options. The most important
#			being:
#			    NO_SSLv2  Disallow the use of SSLv2
#			    NO_SSLv3  Disallow the use of SSLv3
#			    NO_TLSv1  Disallow the use of TLSv1
#			    SINGLE_DH_USE Always create a new key when using
#				      temporary/ephemeral DH key exchanges
#			See src/ssl_support.c or OpenSSL SSL_CTX_set_options
#			documentation for a complete list of options.
#
#	   clientca=	File containing the list of CAs to use when
#			requesting a client certificate.
#
#	   cafile=	File containing additional CA certificates to
#			use when verifying client certificates. If unset
#			clientca will be used.
#
#	   capath=	Directory containing additional CA certificates
#			and CRL lists to use when verifying client certificates.
#
#	   crlfile=	File of additional CRL lists to use when verifying
#			the client certificate, in addition to CRLs stored in
#			the capath. Implies VERIFY_CRL flag below.
#
#	   dhparams=	File containing DH parameters for temporary/ephemeral
#			DH key exchanges.
#
#	   sslflags=	Various flags modifying the use of SSL:
#			    DELAYED_AUTH
#				Don't request client certificates  
#				immediately, but wait until acl processing
#				requires a certificate (not yet implemented).
#			    NO_DEFAULT_CA
#				Don't use the default CA lists built in  
#				to OpenSSL.
#			    NO_SESSION_REUSE
#				Don't allow for session reuse. Each connection  
#				will result in a new SSL session.
#			    VERIFY_CRL
#				Verify CRL lists when accepting client
#				certificates.
#			    VERIFY_CRL_ALL
#				Verify CRL lists for all certificates in the
#				client certificate chain.
#
#	   sslcontext=	SSL session ID context identifier.
#
#
#Default:
# none

#  TAG: tcp_outgoing_tos
#	Allows you to select a TOS/Diffserv value to mark outgoing
#	connections with, based on the username or source address
#	making the request.
#
#	tcp_outgoing_tos ds-field [!]aclname ...
#
#	Example where normal_service_net uses the TOS value 0x00
#	and good_service_net uses 0x20
#
#	acl normal_service_net src 10.0.0.0/255.255.255.0
#	acl good_service_net src 10.0.1.0/255.255.255.0
#	tcp_outgoing_tos 0x00 normal_service_net
#	tcp_outgoing_tos 0x20 good_service_net
#
#	TOS/DSCP values really only have local significance - so you should
#	know what you're specifying. For more information, see RFC2474 and  
#	RFC3260.
#
#	The TOS/DSCP byte must be exactly that - a octet value  0 - 255, or
#	"default" to use whatever default your host has. Note that in  
#	practice often only values 0 - 63 is usable as the two highest bits
#	have been redefined for use by ECN (RFC3168).
#
#	Processing proceeds in the order specified, and stops at first fully
#	matching line.
#
#	Note: The use of this directive using client dependent ACLs is
#	incompatible with the use of server side persistent connections. To
#	ensure correct results it is best to set server_persisten_connections
#	to off when using this directive in such configurations.
#
#Default:
# none

#  TAG: tcp_outgoing_address
#	Allows you to map requests to different outgoing IP addresses
#	based on the username or source address of the user making
#	the request.
#
#	tcp_outgoing_address ipaddr [[!]aclname] ...
#
#	Example where requests from 10.0.0.0/24 will be forwarded
#	with source address 10.1.0.1, 10.0.2.0/24 forwarded with
#	source address 10.1.0.2 and the rest will be forwarded with
#	source address 10.1.0.3.
#
#	acl normal_service_net src 10.0.0.0/24
#	acl good_service_net src 10.0.1.0/24 10.0.2.0/24
#	tcp_outgoing_address 10.1.0.1 normal_service_net
#	tcp_outgoing_address 10.1.0.2 good_service_net
#	tcp_outgoing_address 10.1.0.3
#
#	Processing proceeds in the order specified, and stops at first fully
#	matching line.
#
#	Note: The use of this directive using client dependent ACLs is
#	incompatible with the use of server side persistent connections. To
#	ensure correct results it is best to set server_persistent_connections
#	to off when using this directive in such configurations.
#
#Default:
# none

#  TAG: zph_mode
#	This option enables packet level marking of HIT/MISS responses,
#	either using IP TOS or socket priority.
#	    off		Feature disabled
#	    tos		Set the IP TOS/Diffserv field
#	    priority	Set the socket priority (may get mapped to TOS by OS,
#			otherwise only usable in local rulesets)
#	    option	Embed the mark in an IP option field. See also
#	    		zph_option.
#
#	See also tcp_outgoing_tos for details/requirements about TOS usage.
#
#Default:
# zph_mode off

#  TAG: zph_local
#	Allows you to select a TOS/Diffserv/Priority value to mark local hits.
#	Default: 0 (disabled).
#
#Default:
# zph_local 0

#  TAG: zph_sibling
#	Allows you to select a TOS/Diffserv/Priority value to mark sibling hits.
#	Default: 0 (disabled).
#
#Default:
# zph_sibling 0

#  TAG: zph_parent
#	Allows you to select a TOS/Diffserv/Priority value to mark parent hits. 
#	Default: 0 (disabled).
#
#Default:
# zph_parent 0

#  TAG: zph_option
#	The IP option to use when zph_mode is set to "option". Defaults to  
#	136 which is officially registered as "SATNET Stream ID".  
#
#Default:
# zph_option 136


# OPTIONS WHICH AFFECT THE NEIGHBOR SELECTION ALGORITHM
# -----------------------------------------------------------------------------

#  TAG: cache_peer
#	To specify other caches in a hierarchy, use the format:
#
#		cache_peer hostname type http-port icp-port [options]
#
#	For example,
#
#	#                                        proxy  icp
#	#          hostname             type     port   port  options
#	#          -------------------- -------- ----- -----  -----------
#	cache_peer parent.foo.net       parent    3128  3130  proxy-only default
#	cache_peer sib1.foo.net         sibling   3128  3130  proxy-only
#	cache_peer sib2.foo.net         sibling   3128  3130  proxy-only
#
#	      type:  either 'parent', 'sibling', or 'multicast'.  
#
#	proxy-port:  The port number where the cache listens for proxy
#		     requests.
#
#	  icp-port:  Used for querying neighbor caches about
#		     objects.  To have a non-ICP neighbor
#		     specify '7' for the ICP port and make sure the  
#		     neighbor machine has the UDP echo port
#		     enabled in its /etc/inetd.conf file.
#		NOTE: Also requires icp_port option enabled to send/receive
#		      requests via this method.
#
#	    options: proxy-only
#		     weight=n
#		     ttl=n
#		     no-query
#		     default
#		     round-robin
#		     carp
#		     multicast-responder
#		     multicast-siblings
#		     closest-only
#		     no-digest
#		     no-netdb-exchange
#		     no-delay
#		     login=user:password | PASS | *:password
#		     connect-timeout=nn
#		     digest-url=url
#		     allow-miss
#		     max-conn=n
#		     htcp
#		     htcp-oldsquid
#		     originserver
#		     userhash
#		     sourcehash
#		     name=xxx
#		     monitorurl=url
#		     monitorsize=sizespec
#		     monitorinterval=seconds
#		     monitortimeout=seconds
#		     forceddomain=name
#		     ssl
#		     sslcert=/path/to/ssl/certificate
#		     sslkey=/path/to/ssl/key
#		     sslversion=1|2|3|4
#		     sslcipher=...
#		     ssloptions=...
#		     front-end-https[=on|auto]
#		     connection-auth[=on|off|auto]
#		     idle=n
#		     http11
#
#		     use 'proxy-only' to specify objects fetched  
#		     from this cache should not be saved locally.
#
#		     use 'weight=n' to affect the selection of a peer  
#		     during any weighted peer-selection mechanisms.
#		     The weight must be an integer; default is 1,
#		     larger weights are favored more.
#		     This option does not affect parent selection if a peering
#		     protocol is not in use.
#
#		     use 'ttl=n' to specify a IP multicast TTL to use  
#		     when sending an ICP queries to this address.
#		     Only useful when sending to a multicast group.
#		     Because we don't accept ICP replies from random  
#		     hosts, you must configure other group members as
#		     peers with the 'multicast-responder' option below.  
#
#		     use 'no-query' to NOT send ICP queries to this  
#		     neighbor.
#
#		     use 'default' if this is a parent cache which can  
#		     be used as a "last-resort" if a peer cannot be located  
#		     by any of the peer-selection mechanisms.
#		     If specified more than once, only the first is used.
#
#		     use 'round-robin' to define a set of parents which  
#		     should be used in a round-robin fashion in the
#		     absence of any ICP queries.
#
#		     use 'carp' to define a set of parents which should  
#		     be used as a CARP array. The requests will be
#		     distributed among the parents based on the CARP load
#		     balancing hash function based on their weight.
#
#		     'multicast-responder' indicates the named peer  
#		     is a member of a multicast group.  ICP queries will
#		     not be sent directly to the peer, but ICP replies
#		     will be accepted from it.
#
#		     the 'multicast-siblings' option is meant to be used  
#		     only for cache peers of type "multicast". It instructs  
#		     Squid that ALL members of this multicast group have
#		     "sibling" relationship with it, not "parent".  This is  
#		     an optimization that avoids useless multicast queries
#		     to a multicast group when the requested object would
#		     be fetched only from a "parent" cache, anyway.  It's  
#		     useful, e.g., when configuring a pool of redundant
#		     Squid proxies, being members of the same
#		     multicast group.
#
#		     'closest-only' indicates that, for ICP_OP_MISS  
#		     replies, we'll only forward CLOSEST_PARENT_MISSes  
#		     and never FIRST_PARENT_MISSes.
#
#		     use 'no-digest' to NOT request cache digests from  
#		     this neighbor.
#
#		     'no-netdb-exchange' disables requesting ICMP  
#		     RTT database (NetDB) from the neighbor.
#
#		     use 'no-delay' to prevent access to this neighbor  
#		     from influencing the delay pools.
#
#		     use 'login=user:password' if this is a personal/workgroup  
#		     proxy and your parent requires proxy authentication.
#		     Note: The string can include URL escapes (i.e. %20 for
#		     spaces). This also means % must be written as %%.
#
#		     use 'login=PASS' if users must authenticate against  
#		     the upstream proxy or in the case of a reverse proxy
#		     configuration, the origin web server.  This will pass
#		     the users credentials as they are to the peer.
#		     Note: To combine this with local authentication the Basic
#		     authentication scheme must be used, and both servers must
#		     share the same user database as HTTP only allows for
#		     a single login (one for proxy, one for origin server).
#		     Also be warned this will expose your users proxy
#		     password to the peer. USE WITH CAUTION
#
#		     use 'login=*:password' to pass the username to the  
#		     upstream cache, but with a fixed password. This is meant
#		     to be used when the peer is in another administrative
#		     domain, but it is still needed to identify each user.
#		     The star can optionally be followed by some extra
#		     information which is added to the username. This can
#		     be used to identify this proxy to the peer, similar to
#		     the login=username:password option above.
#
#		     use 'connect-timeout=nn' to specify a peer  
#		     specific connect timeout (also see the
#		     peer_connect_timeout directive)
#
#		     use 'digest-url=url' to tell Squid to fetch the cache  
#		     digest (if digests are enabled) for this host from
#		     the specified URL rather than the Squid default
#		     location.
#
#		     use 'allow-miss' to disable Squid's use of only-if-cached  
#		     when forwarding requests to siblings. This is primarily
#		     useful when icp_hit_stale is used by the sibling. To
#		     extensive use of this option may result in forwarding
#		     loops, and you should avoid having two-way peerings
#		     with this option. (for example to deny peer usage on
#		     requests from peer by denying cache_peer_access if the
#		     source is a peer)
#
#		     use 'max-conn=n' to limit the amount of connections Squid  
#		     may open to this peer.
#
#		     use 'htcp' to send HTCP, instead of ICP, queries  
#		     to the neighbor.  You probably also want to
#		     set the "icp port" to 4827 instead of 3130.  
#		     You must also allow this Squid htcp_access and
#		     http_access in the peer Squid configuration.
#
#		     use 'htcp-oldsquid' to send HTCP to old Squid versions  
#		     You must also allow this Squid htcp_access and
#		     http_access in the peer Squid configuration.
#
#		     'originserver' causes this parent peer to be contacted as  
#		     a origin server. Meant to be used in accelerator setups.
#
#		     use 'userhash' to load-balance amongst a set of parents  
#		     based on the client proxy_auth or ident username.
#
#		     use 'sourcehash' to load-balance amongst a set of parents  
#		     based on the client source ip.
#
#		     use 'name=xxx' if you have multiple peers on the same  
#		     host but different ports. This name can be used to
#		     differentiate the peers in cache_peer_access and similar
#		     directives.
#
#		     use 'monitorurl=url' to have periodically request a given  
#		     URL from the peer, and only consider the peer as alive
#		     if this monitoring is successful (default none)
#
#		     use 'monitorsize=min[-max]' to limit the size range of  
#		     'monitorurl' replies considered valid. Defaults to 0 to  
#		     accept any size replies as valid.
#
#		     use 'monitorinterval=seconds' to change frequency of  
#		     how often the peer is monitored with 'monitorurl'  
#		     (default 300 for a 5 minute interval). If set to 0
#		     then monitoring is disabled even if a URL is defined.
#
#		     use 'monitortimeout=seconds' to change the timeout of  
#		     'monitorurl'. Defaults to 'monitorinterval'.  
#
#		     use 'forceddomain=name' to forcibly set the Host header  
#		     of requests forwarded to this peer. Useful in accelerator
#		     setups where the server (peer) expects a certain domain
#		     name and using redirectors to feed this domain name
#		     is not feasible.
#
#		     use 'ssl' to indicate connections to this peer should  
#		     be SSL/TLS encrypted.
#
#		     use 'sslcert=/path/to/ssl/certificate' to specify a client  
#		     SSL certificate to use when connecting to this peer.
#
#		     use 'sslkey=/path/to/ssl/key' to specify the private SSL  
#		     key corresponding to sslcert above. If 'sslkey' is not  
#		     specified 'sslcert' is assumed to reference a  
#		     combined file containing both the certificate and the key.
#
#		     use sslversion=1|2|3|4 to specify the SSL version to use
#		     when connecting to this peer
#			1 = automatic (default)
#			2 = SSL v2 only
#			3 = SSL v3 only
#			4 = TLS v1 only
#
#		     use sslcipher=... to specify the list of valid SSL ciphers
#		     to use when connecting to this peer.
#
#		     use ssloptions=... to specify various SSL engine options:
#			NO_SSLv2  Disallow the use of SSLv2
#			NO_SSLv3  Disallow the use of SSLv3
#			NO_TLSv1  Disallow the use of TLSv1
#		     See src/ssl_support.c or the OpenSSL documentation for
#		     a more complete list.
#
#		     use sslcafile=... to specify a file containing
#		     additional CA certificates to use when verifying the
#		     peer certificate.
#
#		     use sslcapath=... to specify a directory containing
#		     additional CA certificates to use when verifying the
#		     peer certificate.
#
#		     use sslcrlfile=... to specify a certificate revocation
#		     list file to use when verifying the peer certificate.
#
#		     use sslflags=... to specify various flags modifying the
#		     SSL implementation:
#			DONT_VERIFY_PEER
#				Accept certificates even if they fail to
#				verify.
#			NO_DEFAULT_CA
#				Don't use the default CA list built in  
#				to OpenSSL.
#
#		     use ssldomain= to specify the peer name as advertised
#		     in it's certificate. Used for verifying the correctness  
#		     of the received peer certificate. If not specified the
#		     peer hostname will be used.
#
#		     use front-end-https to enable the "Front-End-Https: On"  
#		     header needed when using Squid as a SSL frontend in front
#		     of Microsoft OWA. See MS KB document Q307347 for details
#		     on this header. If set to auto the header will
#		     only be added if the request is forwarded as a https://
#		     URL.
#
#		     use connection-auth=off to tell Squid that this peer does
#		     not support Microsoft connection oriented authentication,
#		     and any such challenges received from there should be
#		     ignored. Default is auto to automatically determine the
#		     status of the peer.
#
#		     use idle=n to specify a minimum number of idle connections
#		     that should be kept open to this peer.
#
#		     use http11 to send requests using HTTP/1.1 to this peer.
#		     Note: The HTTP/1.1 support is still incomplete, with an
#		     internal HTTP/1.0 hop. As result 1xx responses will not
#		     be forwarded.
#
#Default:
# none

#  TAG: cache_peer_domain
#	Use to limit the domains for which a neighbor cache will be
#	queried.  Usage:
#
#	cache_peer_domain cache-host domain [domain ...]
#	cache_peer_domain cache-host !domain
#
#	For example, specifying
#
#		cache_peer_domain parent.foo.net	.edu
#
#	has the effect such that UDP query packets are sent to
#	'bigserver' only when the requested object exists on a  
#	server in the .edu domain.  Prefixing the domain name
#	with '!' means the cache will be queried for objects  
#	NOT in that domain.
#
#	NOTE:	* Any number of domains may be given for a cache-host,
#		  either on the same or separate lines.
#		* When multiple domains are given for a particular
#		  cache-host, the first matched domain is applied.
#		* Cache hosts with no domain restrictions are queried
#		  for all requests.
#		* There are no defaults.
#		* There is also a 'cache_peer_access' tag in the ACL  
#		  section.
#
#Default:
# none

#  TAG: cache_peer_access
#	Similar to 'cache_peer_domain' but provides more flexibility by  
#	using ACL elements.
#
#	cache_peer_access cache-host allow|deny [!]aclname ...
#
#	The syntax is identical to 'http_access' and the other lists of  
#	ACL elements.  See the comments for 'http_access' below, or  
#	the Squid FAQ (http://www.squid-cache.org/FAQ/FAQ-10.html).
#
#Default:
# none

#  TAG: neighbor_type_domain
#	usage: neighbor_type_domain neighbor parent|sibling domain domain ...
#
#	Modifying the neighbor type for specific domains is now
#	possible.  You can treat some domains differently than the the
#	default neighbor type specified on the 'cache_peer' line.  
#	Normally it should only be necessary to list domains which
#	should be treated differently because the default neighbor type
#	applies for hostnames which do not match domains listed here.
#
#EXAMPLE:
#	cache_peer cache.foo.org parent 3128 3130
#	neighbor_type_domain cache.foo.org sibling .com .net
#	neighbor_type_domain cache.foo.org sibling .au .de
#
#Default:
# none

#  TAG: dead_peer_timeout	(seconds)
#	This controls how long Squid waits to declare a peer cache
#	as "dead."  If there are no ICP replies received in this  
#	amount of time, Squid will declare the peer dead and not
#	expect to receive any further ICP replies.  However, it
#	continues to send ICP queries, and will mark the peer as
#	alive upon receipt of the first subsequent ICP reply.
#
#	This timeout also affects when Squid expects to receive ICP
#	replies from peers.  If more than 'dead_peer' seconds have  
#	passed since the last ICP reply was received, Squid will not
#	expect to receive an ICP reply on the next query.  Thus, if
#	your time between requests is greater than this timeout, you
#	will see a lot of requests sent DIRECT to origin servers
#	instead of to your parents.
#
#Default:
# dead_peer_timeout 10 seconds

#  TAG: hierarchy_stoplist
#	A list of words which, if found in a URL, cause the object to
#	be handled directly by this cache.  In other words, use this
#	to not query neighbor caches for certain objects.  You may
#	list this option multiple times. Note: never_direct overrides
#	this option.
#We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?


# MEMORY CACHE OPTIONS
# -----------------------------------------------------------------------------

#  TAG: cache_mem	(bytes)
#	NOTE: THIS PARAMETER DOES NOT SPECIFY THE MAXIMUM PROCESS SIZE.
#	IT ONLY PLACES A LIMIT ON HOW MUCH ADDITIONAL MEMORY SQUID WILL
#	USE AS A MEMORY CACHE OF OBJECTS. SQUID USES MEMORY FOR OTHER
#	THINGS AS WELL. SEE THE SQUID FAQ SECTION 8 FOR DETAILS.
#
#	'cache_mem' specifies the ideal amount of memory to be used  
#	for:
#		* In-Transit objects
#		* Hot Objects
#		* Negative-Cached objects
#
#	Data for these objects are stored in 4 KB blocks.  This
#	parameter specifies the ideal upper limit on the total size of
#	4 KB blocks allocated.  In-Transit objects take the highest
#	priority.
#
#	In-transit objects have priority over the others.  When
#	additional space is needed for incoming data, negative-cached
#	and hot objects will be released.  In other words, the
#	negative-cached and hot objects will fill up any unused space
#	not needed for in-transit objects.
#
#	If circumstances require, this limit will be exceeded.
#	Specifically, if your incoming request rate requires more than
#	'cache_mem' of memory to hold in-transit objects, Squid will  
#	exceed this limit to satisfy the new requests.  When the load
#	decreases, blocks will be freed until the high-water mark is
#	reached.  Thereafter, blocks will be used to store hot
#	objects.
#
#Default:
# cache_mem 8 MB

cache_mem 128 MB

#  TAG: maximum_object_size_in_memory	(bytes)
#	Objects greater than this size will not be attempted to kept in
#	the memory cache. This should be set high enough to keep objects
#	accessed frequently in memory to improve performance whilst low
#	enough to keep larger objects from hoarding cache_mem.
#
#Default:
# maximum_object_size_in_memory 8 KB

#  TAG: memory_replacement_policy
#	The memory replacement policy parameter determines which
#	objects are purged from memory when memory space is needed.
#
#	See cache_replacement_policy for details.
#
#Default:
# memory_replacement_policy lru


# DISK CACHE OPTIONS
# -----------------------------------------------------------------------------

#  TAG: cache_replacement_policy
#	The cache replacement policy parameter determines which
#	objects are evicted (replaced) when disk space is needed.
#
#	    lru       : Squid's original list based LRU policy  
#	    heap GDSF : Greedy-Dual Size Frequency
#	    heap LFUDA: Least Frequently Used with Dynamic Aging
#	    heap LRU  : LRU policy implemented using a heap
#
#	Applies to any cache_dir lines listed below this.
#
#	The LRU policies keeps recently referenced objects.
#
#	The heap GDSF policy optimizes object hit rate by keeping smaller
#	popular objects in cache so it has a better chance of getting a
#	hit.  It achieves a lower byte hit rate than LFUDA though since
#	it evicts larger (possibly popular) objects.
#
#	The heap LFUDA policy keeps popular objects in cache regardless of
#	their size and thus optimizes byte hit rate at the expense of
#	hit rate since one large, popular object will prevent many
#	smaller, slightly less popular objects from being cached.
#
#	Both policies utilize a dynamic aging mechanism that prevents
#	cache pollution that can otherwise occur with frequency-based
#	replacement policies.
#
#	NOTE: if using the LFUDA replacement policy you should increase
#	the value of maximum_object_size above its default of 4096 KB to
#	to maximize the potential byte hit rate improvement of LFUDA.
#
#	For more information about the GDSF and LFUDA cache replacement
#	policies see http://www.hpl.hp.com/techreports/1999/HPL-1999-69.html
#	and http://fog.hpl.external.hp.com/techreports/98/HPL-98-173.html.
#
#Default:
# cache_replacement_policy lru

#  TAG: cache_dir
#	Usage:
#
#	cache_dir Type Directory-Name Fs-specific-data [options]
#
#	You can specify multiple cache_dir lines to spread the
#	cache among different disk partitions.
#
#	Type specifies the kind of storage system to use. Only "ufs"  
#	is built by default. To enable any of the other storage systems
#	see the --enable-storeio configure option.
#
#	'Directory' is a top-level directory where cache swap  
#	files will be stored. If you want to use an entire disk
#	for caching, this can be the mount-point directory.
#	The directory must exist and be writable by the Squid
#	process. Squid will NOT create this directory for you.
#	Only using COSS, a raw disk device or a stripe file can
#	be specified, but the configuration of the "cache_swap_log"  
#	tag is mandatory.
#
#	The ufs store type:
#
#	"ufs" is the old well-known Squid storage format that has always  
#	been there.
#
#	cache_dir ufs Directory-Name Mbytes L1 L2 [options]
#
#	'Mbytes' is the amount of disk space (MB) to use under this  
#	directory.  The default is 100 MB.  Change this to suit your
#	configuration.  Do NOT put the size of your disk drive here.
#	Instead, if you want Squid to use the entire disk drive,
#	subtract 20% and use that value.
#
#	'Level-1' is the number of first-level subdirectories which  
#	will be created under the 'Directory'.  The default is 16.  
#
#	'Level-2' is the number of second-level subdirectories which  
#	will be created under each first-level directory.  The default
#	is 256.
#
#	The aufs store type:
#
#	"aufs" uses the same storage format as "ufs", utilizing  
#	POSIX-threads to avoid blocking the main Squid process on
#	disk-I/O. This was formerly known in Squid as async-io.
#
#	cache_dir aufs Directory-Name Mbytes L1 L2 [options]
#
#	see argument descriptions under ufs above
#
#	The diskd store type:
#
#	"diskd" uses the same storage format as "ufs", utilizing a  
#	separate process to avoid blocking the main Squid process on
#	disk-I/O.
#
#	cache_dir diskd Directory-Name Mbytes L1 L2 [options] [Q1=n] [Q2=n]
#
#	see argument descriptions under ufs above
#
#	Q1 specifies the number of unacknowledged I/O requests when Squid
#	stops opening new files. If this many messages are in the queues,
#	Squid won't open new files. Default is 64  
#
#	Q2 specifies the number of unacknowledged messages when Squid
#	starts blocking.  If this many messages are in the queues,
#	Squid blocks until it receives some replies. Default is 72
#
#	When Q1 < Q2 (the default), the cache directory is optimized
#	for lower response time at the expense of a decrease in hit
#	ratio.  If Q1 > Q2, the cache directory is optimized for
#	higher hit ratio at the expense of an increase in response
#	time.
#
#	The coss store type:
#
#	block-size=n defines the "block size" for COSS cache_dir's.  
#	Squid uses file numbers as block numbers.  Since file numbers
#	are limited to 24 bits, the block size determines the maximum
#	size of the COSS partition.  The default is 512 bytes, which
#	leads to a maximum cache_dir size of 512<<24, or 8 GB.  Note
#	you should not change the COSS block size after Squid
#	has written some objects to the cache_dir.
#
#	overwrite-percent=n defines the percentage of disk that COSS
#	must write to before a given object will be moved to the
#	current stripe.  A value of "n" closer to 100 will cause COSS  
#	to waste less disk space by having multiple copies of an object
#	on disk, but will increase the chances of overwriting a popular
#	object as COSS overwrites stripes.  A value of "n" close to 0  
#	will cause COSS to keep all current objects in the current COSS
#	stripe at the expense of the hit rate.  The default value of 50
#	will allow any given object to be stored on disk a maximum of
#	2 times.
#
#	max-stripe-waste=n defines the maximum amount of space that COSS
#	will waste in a given stripe (in bytes).  When COSS writes data
#	to disk, it will potentially waste up to "max-size" worth of disk  
#	space for each 1MB of data written.  If "max-size" is set to a  
#	large value (ie >256k), this could potentially result in large
#	amounts of wasted disk space. Setting this value to a lower value
#	(ie 64k or 32k) will result in a COSS disk refusing to cache
#	larger objects until the COSS stripe has been filled to within
#	"max-stripe-waste" of the maximum size (1MB).  
#
#	membufs=n defines the number of "memory-only" stripes that COSS  
#	will use.  When an cache hit is performed on a COSS stripe before
#	COSS has reached the overwrite-percent value for that object,
#	COSS will use a series of memory buffers to hold the object in
#	while the data is sent to the client.  This will define the maximum
#	number of memory-only buffers that COSS will use.  The default value
#	is 10, which will use a maximum of 10MB of memory for buffers.
#
#	maxfullbufs=n defines the maximum number of stripes a COSS partition
#	will have in memory waiting to be freed (either because the disk is
#	under load and the stripe is unwritten, or because clients are still
#	transferring data from objects using the memory).  In order to try
#	and maintain a good hit rate under load, COSS will reserve the last
#	2 full stripes for object hits. (ie a COSS cache_dir will reject
#	new objects when the number of full stripes is 2 less than maxfullbufs)
#
#	The null store type:
#
#	no options are allowed or required
#
#	Common options:
#
#	no-store, no new objects should be stored to this cache_dir
#
#	min-size=n, refers to the min object size this storedir will accept.
#	It's used to restrict a storedir to only store large objects  
#	(e.g. aufs) while other storedirs are optimized for smaller objects
#	(e.g. COSS). Defaults to 0.
#
#	max-size=n, refers to the max object size this storedir supports.
#	It is used to initially choose the storedir to dump the object.
#	Note: To make optimal use of the max-size limits you should order
#	the cache_dir lines with the smallest max-size value first and the
#	ones with no max-size specification last.
#
#	Note that for coss, max-size must be less than COSS_MEMBUF_SZ
#	(hard coded at 1 MB).
#
#Default:
# cache_dir ufs c:/squid/var/cache 100 16 256

cache_dir ufs c:/squid/var/cache 512 32 128

#  TAG: store_dir_select_algorithm
#	Set this to 'round-robin' as an alternative.  
#
#Default:
# store_dir_select_algorithm least-load

#  TAG: max_open_disk_fds
#	To avoid having disk as the I/O bottleneck Squid can optionally
#	bypass the on-disk cache if more than this amount of disk file
#	descriptors are open.
#
#	A value of 0 indicates no limit.
#
#Default:
# max_open_disk_fds 0

#  TAG: minimum_object_size	(bytes)
#	Objects smaller than this size will NOT be saved on disk.  The
#	value is specified in kilobytes, and the default is 0 KB, which
#	means there is no minimum.
#
#Default:
# minimum_object_size 0 KB

#  TAG: maximum_object_size	(bytes)
#	Objects larger than this size will NOT be saved on disk.  The
#	value is specified in kilobytes, and the default is 4MB.  If
#	you wish to get a high BYTES hit ratio, you should probably
#	increase this (one 32 MB object hit counts for 3200 10KB
#	hits).  If you wish to increase speed more than your want to
#	save bandwidth you should leave this low.
#
#	NOTE: if using the LFUDA replacement policy you should increase
#	this value to maximize the byte hit rate improvement of LFUDA!
#	See replacement_policy below for a discussion of this policy.
#
#Default:
# maximum_object_size 4096 KB

#  TAG: cache_swap_low	(percent, 0-100)
#  TAG: cache_swap_high	(percent, 0-100)
#
#	The low- and high-water marks for cache object replacement.
#	Replacement begins when the swap (disk) usage is above the
#	low-water mark and attempts to maintain utilization near the
#	low-water mark.  As swap utilization gets close to high-water
#	mark object eviction becomes more aggressive.  If utilization is
#	close to the low-water mark less replacement is done each time.
#
#	Defaults are 90% and 95%. If you have a large cache, 5% could be
#	hundreds of MB. If this is the case you may wish to set these
#	numbers closer together.
#
#Default:
# cache_swap_low 90
# cache_swap_high 95

#  TAG: update_headers	on|off
#	By default Squid updates stored HTTP headers when receiving
#	a 304 response. Set this to off if you want to disable this
#	for disk I/O performance reasons. Disabling this VIOLATES the
#	HTTP standard, and could make you liable for problems which it
#	causes.
#
#Default:
# update_headers on


# LOGFILE OPTIONS
# -----------------------------------------------------------------------------

#  TAG: logformat
#	Usage:
#
#	logformat <name> <format specification>
#
#	Defines an access log format.
#
#	The <format specification> is a string with embedded % format codes
#
#	% format codes all follow the same basic structure where all but
#	the formatcode is optional. Output strings are automatically escaped
#	as required according to their context and the output format
#	modifiers are usually not needed, but can be specified if an explicit
#	output format is desired.
#
#		% ["|[|'|#] [-] [[0]width] [{argument}] formatcode  
#
#		"	output in quoted string format  
#		[	output in squid text log format as used by log_mime_hdrs
#		#	output in URL quoted format
#		'	output as-is  
#
#		-	left aligned
#		width	field width. If starting with 0 the
#			output is zero padded
#		{arg}	argument such as header name etc
#
#	Format codes:
#
#		>a	Client source IP address
#		>A	Client FQDN
#		>p	Client source port
#		<A	Server IP address or peer name
#		la	Local IP address (http_port)
#		lp	Local port number (http_port)
#		oa	Our outgoing IP address (tcp_outgoing_address)
#		ts	Seconds since epoch
#		tu	subsecond time (milliseconds)
#		tl	Local time. Optional strftime format argument
#			default %d/%b/%Y:%H:%M:%S %z
#		tg	GMT time. Optional strftime format argument
#			default %d/%b/%Y:%H:%M:%S %z
#		tr	Response time (milliseconds)
#		>h	Request header. Optional header name argument
#			on the format header[:[separator]element]
#		<h	Reply header. Optional header name argument
#			as for >h
#		un	User name
#		ul	User name from authentication
#		ui	User name from ident
#		us	User name from SSL
#		ue	User name from external acl helper
#		Hs	HTTP status code
#		Ss	Squid request status (TCP_MISS etc)
#		Sh	Squid hierarchy status (DEFAULT_PARENT etc)
#		mt	MIME content type
#		rm	Request method (GET/POST etc)
#		ru	Request URL
#		rp	Request URL-Path excluding hostname
#		rv	Request protocol version
#		ea	Log string returned by external acl
#		<st	Reply size including HTTP headers
#		>st	Request size including HTTP headers
#		st	Request+Reply size including HTTP headers
#		sn	Unique sequence number per log line entry
#		%	a literal % character
#
#	The default formats available (which do not need re-defining) are:
#
#logformat squid %ts.%03tu %6tr %>a %Ss/%03Hs %<st %rm %ru %un %Sh/%<A %mt
#logformat squidmime %ts.%03tu %6tr %>a %Ss/%03Hs %<st %rm %ru %un %Sh/%<A %mt [%>h] [%<h]
#logformat common %>a %ui %un [%tl] "%rm %ru HTTP/%rv" %Hs %<st %Ss:%Sh  
#logformat combined %>a %ui %un [%tl] "%rm %ru HTTP/%rv" %Hs %<st "%{Referer}>h" "%{User-Agent}>h" %Ss:%Sh  
#
#Default:
# none

logformat hsshsp %{%d.%m.%Y %H:%M:%S}tl %>a %ul %rm %Ss %ru

#  TAG: access_log
#	These files log client request activities. Has a line every HTTP or
#	ICP request. The format is:
#	access_log <filepath> [<logformat name> [acl acl ...]]
#	access_log none [acl acl ...]]
#
#	Will log to the specified file using the specified format (which
#	must be defined in a logformat directive) those entries which match
#	ALL the acl's specified (which must be defined in acl clauses).  
#	If no acl is specified, all requests will be logged to this file.
#
#	To disable logging of a request use the filepath "none", in which case  
#	a logformat name should not be specified.
#
#	To log the request via syslog specify a filepath of "syslog":  
#
#	access_log syslog[:facility.priority] [format [acl1 [acl2 ....]]]
#	where facility could be any of:
#	authpriv, daemon, local0 .. local7 or user.
#
#	And priority could be any of:
#	err, warning, notice, info, debug.

access_log c:/squid/var/logs/access.log hsshsp

#  TAG: log_access	allow|deny acl acl...
#	This options allows you to control which requests gets logged
#	to access.log (see access_log directive). Requests denied for
#	logging will also not be accounted for in performance counters.
#
#Default:
# none

#  TAG: logfile_daemon
#	Specify the path to the logfile-writing daemon. This daemon is
#	used to write the access and store logs, if configured.
#
#Default:
# logfile_daemon c:/squid/libexec/logfile-daemon.exe

#  TAG: cache_log
#	Cache logging file. This is where general information about
#	your cache's behavior goes. You can increase the amount of data  
#	logged to this file with the "debug_options" tag below.  
#
#Default:
# cache_log c:/squid/var/logs/cache.log

cache_log c:/squid/var/logs/cache.log

#  TAG: cache_store_log
#	Logs the activities of the storage manager.  Shows which
#	objects are ejected from the cache, and which objects are
#	saved and for how long.  To disable, enter "none". There are  
#	not really utilities to analyze this data, so you can safely
#	disable it.
#
#Default:
# cache_store_log c:/squid/var/logs/store.log

cache_store_log c:/squid/var/logs/store.log

#  TAG: cache_swap_state
#	Location for the cache "swap.state" file. This index file holds  
#	the metadata of objects saved on disk.  It is used to rebuild
#	the cache during startup.  Normally this file resides in each
#	'cache_dir' directory, but you may specify an alternate  
#	pathname here.  Note you must give a full filename, not just
#	a directory. Since this is the index for the whole object
#	list you CANNOT periodically rotate it!
#
#	If %s can be used in the file name it will be replaced with a
#	a representation of the cache_dir name where each / is replaced
#	with '.'. This is needed to allow adding/removing cache_dir  
#	lines when cache_swap_log is being used.
#
#	If have more than one 'cache_dir', and %s is not used in the name  
#	these swap logs will have names such as:
#
#		cache_swap_log.00
#		cache_swap_log.01
#		cache_swap_log.02
#
#	The numbered extension (which is added automatically)
#	corresponds to the order of the 'cache_dir' lines in this  
#	configuration file.  If you change the order of the 'cache_dir'  
#	lines in this file, these index files will NOT correspond to
#	the correct 'cache_dir' entry (unless you manually rename  
#	them).  We recommend you do NOT use this option.  It is
#	better to keep these index files in each 'cache_dir' directory.  
#
#Default:
# none

#  TAG: logfile_rotate
#	Specifies the number of logfile rotations to make when you
#	type 'squid -k rotate'.  The default is 10, which will rotate  
#	with extensions 0 through 9.  Setting logfile_rotate to 0 will
#	disable the file name rotation, but the logfiles are still closed
#	and re-opened.  This will enable you to rename the logfiles
#	yourself just before sending the rotate signal.
#
#	Note, the 'squid -k rotate' command normally sends a USR1  
#	signal to the running squid process.  In certain situations
#	(e.g. on Linux with Async I/O), USR1 is used for other
#	purposes, so -k rotate uses another signal.  It is best to get
#	in the habit of using 'squid -k rotate' instead of 'kill -USR1  
#	<pid>'.  
#
#Default:
# logfile_rotate 10

#  TAG: emulate_httpd_log	on|off
#	The Cache can emulate the log file format which many 'httpd'  
#	programs use.  To disable/enable this emulation, set
#	emulate_httpd_log to 'off' or 'on'.  The default  
#	is to use the native log format since it includes useful
#	information Squid-specific log analyzers use.
#
#Default:
# emulate_httpd_log off

#  TAG: log_ip_on_direct	on|off
#	Log the destination IP address in the hierarchy log tag when going
#	direct. Earlier Squid versions logged the hostname here. If you
#	prefer the old way set this to off.
#
#Default:
# log_ip_on_direct on

#  TAG: mime_table
#	Pathname to Squid's MIME table. You shouldn't need to change  
#	this, but the default file contains examples and formatting
#	information if you do.
#
#Default:
# mime_table c:/squid/etc/mime.conf

mime_table c:/squid/etc/mime.conf

#  TAG: log_mime_hdrs	on|off
#	The Cache can record both the request and the response MIME
#	headers for each HTTP transaction.  The headers are encoded
#	safely and will appear as two bracketed fields at the end of
#	the access log (for either the native or httpd-emulated log
#	formats).  To enable this logging set log_mime_hdrs to 'on'.  
#
#Default:
# log_mime_hdrs off

#  TAG: useragent_log
#	Squid will write the User-Agent field from HTTP requests
#	to the filename specified here.  By default useragent_log
#	is disabled.
#
#Default:
# none

#  TAG: referer_log
#	Squid will write the Referer field from HTTP requests to the
#	filename specified here.  By default referer_log is disabled.
#	Note that "referer" is actually a misspelling of "referrer"  
#	however the misspelt version has been accepted into the HTTP RFCs
#	and we accept both.
#
#Default:
# none

#  TAG: pid_filename
#	A filename to write the process-id to.  To disable, enter "none".  
#
#Default:
# pid_filename c:/squid/var/logs/squid.pid

#  TAG: debug_options
#	Logging options are set as section,level where each source file
#	is assigned a unique section.  Lower levels result in less
#	output,  Full debugging (level 9) can result in a very large
#	log file, so be careful.  The magic word "ALL" sets debugging  
#	levels for all sections.  We recommend normally running with
#	"ALL,1".  
#
#Default:
# debug_options ALL,1

#  TAG: log_fqdn	on|off
#	Turn this on if you wish to log fully qualified domain names
#	in the access.log. To do this Squid does a DNS lookup of all
#	IP's connecting to it. This can (in some situations) increase  
#	latency, which makes your cache seem slower for interactive
#	browsing.
#
#Default:
# log_fqdn off
log_fqdn off

#  TAG: client_netmask
#	A netmask for client addresses in logfiles and cachemgr output.
#	Change this to protect the privacy of your cache clients.
#	A netmask of 255.255.255.0 will log all IP's in that range with  
#	the last digit set to '0'.  
#
#Default:
# client_netmask 255.255.255.255

#  TAG: forward_log
# Note: This option is only available if Squid is rebuilt with the
#       --enable-forward-log option
#
#	Logs the server-side requests.
#
#	This is currently work in progress.
#
#Default:
# none

#  TAG: strip_query_terms
#	By default, Squid strips query terms from requested URLs before
#	logging.  This protects your user's privacy.  
#
#Default:
# strip_query_terms on

#  TAG: buffered_logs	on|off
#	cache.log log file is written with stdio functions, and as such
#	it can be buffered or unbuffered. By default it will be unbuffered.
#	Buffering it can speed up the writing slightly (though you are
#	unlikely to need to worry unless you run with tons of debugging
#	enabled in which case performance will suffer badly anyway..).
#
#Default:
# buffered_logs off

#  TAG: netdb_filename
#	A filename where Squid stores it's netdb state between restarts.  
#	To disable, enter "none".  
#
#Default:
# netdb_filename c:/squid/var/logs/netdb.state


# OPTIONS FOR FTP GATEWAYING
# -----------------------------------------------------------------------------

#  TAG: ftp_user
#	If you want the anonymous login password to be more informative
#	(and enable the use of picky ftp servers), set this to something
#	reasonable for your domain, like wwwuser@somewhere.net
#
#	The reason why this is domainless by default is the
#	request can be made on the behalf of a user in any domain,
#	depending on how the cache is used.
#	Some ftp server also validate the email address is valid
#	(for example perl.com).
#
#Default:
# ftp_user Squid@

#  TAG: ftp_list_width
#	Sets the width of ftp listings. This should be set to fit in
#	the width of a standard browser. Setting this too small
#	can cut off long filenames when browsing ftp sites.
#
#Default:
# ftp_list_width 32

#  TAG: ftp_passive
#	If your firewall does not allow Squid to use passive
#	connections, turn off this option.
#
#Default:
# ftp_passive on
Mitglied: Dani
Dani 30.12.2011 um 10:42:44 Uhr
Goto Top
Übersichtlich ist auch was anderes... du hättest auch nur die Zeilen posten können, die du aktiv hast. Damit würde es keinen Roman hingeben!

Ich habe mir die Mühe gemacht und die einzelnen Zeilen kopiert. Versuch es mal damit:
acl all src 0.0.0.0/0.0.0.0 
acl localnet src 10.0.0.0/8		# RFC1918 possible internal network
acl localnet src 172.16.0.0/12	# RFC1918 possible internal network
acl localnet src 192.168.0.0/16	# RFC1918 possible internal network
#
acl SSL_ports port 443
acl Safe_ports port 80		# http
acl Safe_ports port 8080	# http2
acl Safe_ports port 21		# ftp
acl Safe_ports port 443		# https
acl Safe_ports port 70		# gopher
acl Safe_ports port 210		# wais
#acl Safe_ports port 1025-65535	# unregistered ports
acl Safe_ports port 280		# http-mgmt
acl Safe_ports port 488		# gss-http
acl Safe_ports port 591		# filemaker
acl Safe_ports port 777		# multiling http
acl Safe_ports port 3000	# Star Money
acl Safe_ports port 1080	# Star Money
acl CONNECT method CONNECT
#
http_access allow manager localhost
http_access allow localnet
http_access deny manager
#
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access deny all
#
icp_access allow localnet
icp_access deny all
#
http_port 3128
cache_mem 128 MB
cache_dir ufs c:/squid/var/cache 512 32 128
#
logformat hsshsp %{%d.%m.%Y %H:%M:%S}tl %>a %ul %rm %Ss %ru
#
access_log c:/squid/var/logs/access.log hsshsp
cache_log c:/squid/var/logs/cache.log
cache_store_log c:/squid/var/logs/store.log
mime_table c:/squid/etc/mime.conf
log_fqdn off
Mitglied: mcafeehasser
mcafeehasser 30.12.2011 um 14:28:58 Uhr
Goto Top
Hallo Dani,

erstmal Danke für die Mühe.

Wenn ich eine Squid.Conf Datei anlege, die nur diesen Inhalt hat, startet der Squid Dienst nicht.

Die Änderungen an meiner Original Squid.Conf Datei haben keine Änderung verursacht. Der Rechner an dem Squid läuft kommt ins Internet, die Clients weiterhin nicht.
Mitglied: Dani
Dani 30.12.2011 um 14:31:19 Uhr
Goto Top
Kannst du mir sagen, warum hier
access_log c:/squid/var/logs/access.log hsshsp
ein hsshsp dahinter steht?!

Wenn ich eine Squid.Conf Datei anlege, die nur diesen Inhalt hat, startet der Squid Dienst nicht.
Hmm... Gibts ne Fehlermeldung? Ansonsten schau mal selbst, was ich vergessen habe zu kopieren.
Mitglied: mcafeehasser
mcafeehasser 30.12.2011 um 15:10:49 Uhr
Goto Top
damit folgende formatierung: logformat hsshsp %{%d.%m.%Y %H:%M:%S}tl %>a %ul %rm %Ss %ru
benutzt wird.

Fehlermeldungen gibt es keine. Nur beim Versuch den Dienst zu starten erscheint die Meldung, dass der Dienst beendet wurde
da er nicht benutzt wird.

Sollten denn die Einträge Deiner "Squid.conf" an sich ausreichen, damit der Squid arbeiten kann?
Mitglied: Dani
Dani 30.12.2011 um 15:19:54 Uhr
Goto Top
Ah okay... na gut. Ich habe mir eben selber ein Squid for Windows installiert. In den Logdateien steht genau drin, was ihm nicht passt.
Meine Konfig sieht so aus und funktioniert auch:
acl all src 0.0.0.0/0.0.0.0 
acl localhost src 127.0.0.1/32
acl localnet src 10.0.0.0/8		# RFC1918 possible internal network
acl localnet src 172.16.0.0/12	# RFC1918 possible internal network
acl localnet src 192.168.0.0/16	# RFC1918 possible internal network
#
acl SSL_ports port 443
acl Safe_ports port 80		# http
acl Safe_ports port 8080	# http2
acl Safe_ports port 21		# ftp
acl Safe_ports port 443		# https
acl Safe_ports port 70		# gopher
acl Safe_ports port 210		# wais
#acl Safe_ports port 1025-65535	# unregistered ports
acl Safe_ports port 280		# http-mgmt
acl Safe_ports port 488		# gss-http
acl Safe_ports port 591		# filemaker
acl Safe_ports port 777		# multiling http
acl Safe_ports port 3000	# Star Money
acl Safe_ports port 1080	# Star Money
acl CONNECT method CONNECT
#
http_access allow localhost
http_access allow localnet
#
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access deny all
#
icp_access allow localnet
icp_access deny all
#
http_port 3128
cache_mem 128 MB
cache_dir ufs c:/squid/var/cache 512 32 128
#
logformat hsshsp %{%d.%m.%Y %H:%M:%S}tl %>a %ul %rm %Ss %ru
#
access_log c:/squid/var/logs/access.log hsshsp
cache_log c:/squid/var/logs/cache.log
cache_store_log c:/squid/var/logs/store.log
mime_table c:/squid/etc/mime.conf
log_fqdn off
Ggf. musst du das Cache-Verzeichnis komplett löschen und neu anlegen lassen.


Grüße,
Dani
Mitglied: mcafeehasser
mcafeehasser 30.12.2011, aktualisiert am 10.10.2012 um 11:36:50 Uhr
Goto Top
So, mit der Conf startet der Squid jetzt nachdem ich den Cache neu angelegt habe.

Eintrag der cache.log:
2011/12/30 15:54:04| Starting Squid Cache version 2.7.STABLE8 for i686-pc-winnt...
2011/12/30 15:54:04| Running as SQUID Windows System Service on Windows Server 2008
2011/12/30 15:54:04| Service command line is: 
2011/12/30 15:54:04| Process ID 18064
2011/12/30 15:54:04| With 2048 file descriptors available
2011/12/30 15:54:04| With 2048 CRT stdio descriptors available
2011/12/30 15:54:04| Windows sockets initialized
2011/12/30 15:54:04| Using select for the IO loop
2011/12/30 15:54:04| Performing DNS Tests...
2011/12/30 15:54:04| Successful DNS name lookup tests...
2011/12/30 15:54:04| DNS Socket created at 0.0.0.0, port 62700, FD 5
2011/12/30 15:54:04| Adding nameserver 192.168.97.4 from Registry
2011/12/30 15:54:04| Adding domain hsshsp.local from Registry
2011/12/30 15:54:04| User-Agent logging is disabled.
2011/12/30 15:54:04| Referer logging is disabled.
2011/12/30 15:54:04| logfileOpen: opening log c:/squid/var/logs/access.log
2011/12/30 15:54:04| Unlinkd pipe opened on FD 8
2011/12/30 15:54:04| Swap maxSize 524288 + 131072 KB, estimated 50412 objects
2011/12/30 15:54:04| Target number of buckets: 2520
2011/12/30 15:54:04| Using 8192 Store buckets
2011/12/30 15:54:04| Max Mem  size: 131072 KB
2011/12/30 15:54:04| Max Swap size: 524288 KB
2011/12/30 15:54:04| Local cache digest enabled; rebuild/rewrite every 3600/3600 sec
2011/12/30 15:54:04| logfileOpen: opening log c:/squid/var/logs/store.log
2011/12/30 15:54:04| Rebuilding storage in c:/squid/var/cache (DIRTY)
2011/12/30 15:54:04| Using Least Load store dir selection
2011/12/30 15:54:04| Current Directory is c:\squid\sbin
2011/12/30 15:54:04| Loaded Icons.
2011/12/30 15:54:04| Accepting proxy HTTP connections at 0.0.0.0, port 3128, FD 13.
2011/12/30 15:54:04| Accepting ICP messages at 0.0.0.0, port 3130, FD 14.
2011/12/30 15:54:04| Accepting HTCP messages on port 4827, FD 15.
2011/12/30 15:54:04| Accepting SNMP messages on port 3401, FD 16.
2011/12/30 15:54:04| Ready to serve requests.
2011/12/30 15:54:07| Done scanning c:/squid/var/cache (0 entries)
2011/12/30 15:54:07| Finished rebuilding storage from disk.
2011/12/30 15:54:07|         0 Entries scanned
2011/12/30 15:54:07|         0 Invalid entries.
2011/12/30 15:54:07|         0 With invalid flags.
2011/12/30 15:54:07|         0 Objects loaded.
2011/12/30 15:54:07|         0 Objects expired.
2011/12/30 15:54:07|         0 Objects cancelled.
2011/12/30 15:54:07|         0 Duplicate URLs purged.
2011/12/30 15:54:07|         0 Swapfile clashes avoided.
2011/12/30 15:54:07|   Took 3.1 seconds (   0.0 objects/sec).
2011/12/30 15:54:07| Beginning Validation Procedure
2011/12/30 15:54:07|   Completed Validation Procedure
2011/12/30 15:54:07|   Validated 0 Entries
2011/12/30 15:54:07|   store_swap_size = 0k
2011/12/30 15:54:08| storeLateRelease: released 0 objects
Eintrag der Access.log:
30.12.2011 15:54:23 192.168.97.4 - GET TCP_MISS http://www.google.de/
30.12.2011 15:54:25 192.168.97.4 - GET TCP_MISS http://clients1.google.de/generate_204
30.12.2011 15:54:26 192.168.97.4 - GET TCP_MISS http://www.google.de/csi?
30.12.2011 15:56:21 192.168.97.4 - POST TCP_MISS http://safebrowsing.clients.google.com/safebrowsing/downloads?
30.12.2011 15:56:24 192.168.97.4 - GET TCP_MISS http://safebrowsing-cache.google.com/safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAEY8K4EIPSuBCoFcxcBAAMyBXAXAQAH
30.12.2011 15:57:35 192.168.97.4 - GET TCP_MISS http://safebrowsing-cache.google.com/safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAAYy-wDINTsAzIGS_YAAP8D
30.12.2011 15:57:36 192.168.97.4 - GET TCP_MISS http://safebrowsing-cache.google.com/safebrowsing/rd/ChFnb29nLXBoaXNoLXNoYXZhchABGPu3BSD8twUqBfxbAQABMgX7WwEAAQ
30.12.2011 15:57:36 192.168.97.4 - GET TCP_MISS http://safebrowsing-cache.google.com/safebrowsing/rd/ChFnb29nLXBoaXNoLXNoYXZhchAAGOfPCyDozwsyBefnAgAD
30.12.2011 15:57:36 192.168.97.4 - GET TCP_MISS http://safebrowsing-cache.google.com/safebrowsing/rd/ChFnb29nLXBoaXNoLXNoYXZhchAAGOnPCyCQ0AsqCe7nAgD_____BzIF6ecCAB8

192.168.97.4 ist der Rechner mit SQUID. Der Verbindungsversuch des Clients taucht nicht mal auf in der Log.
Mitglied: Dani
Dani 30.12.2011 um 16:15:26 Uhr
Goto Top
Hmm.. Hast du die (Windows)-Firewall zum Test deaktiviert?!
In meiner Testumgebung kommen die Clients auf den Proxy. Dein IP-Bereich ist identisch mit den dereien am Anfang der der Konfiguration. Die beide wo du nicht brauchst, einfach auskommentieren.


Grüße,
Dani
Mitglied: mcafeehasser
mcafeehasser 30.12.2011 um 16:37:11 Uhr
Goto Top
Aye..die Firewall (Windows) an den Clients hatten wir schon aus, nur an die am SBS 2011 hatten wir nicht gedacht -.-

Jetzt funktioniert es. Vielen Dank face-smile)

Nur noch die Firewallausnahmen ich finden muss ^^, weil deaktivieren möchte ich die ungern dauerhaft.
Mitglied: Dani
Dani 30.12.2011 um 16:38:46 Uhr
Goto Top
Naja,
Port 3128 eingehen erlauben. face-smile


Grüße,
Dani
Mitglied: mcafeehasser
mcafeehasser 30.12.2011 um 17:49:51 Uhr
Goto Top
Jap, soweit klar. Nur bei dem Blick auf die Firewallregeln wurde mir ganz seltsam.

Der Mcafee Enterprise (siehe meinen Nicname ^^) hat da nicht unerheblich Einträge vorgenommen. Werde die Sache morgen machen, für heute reichts.

Vielen Dank nochmal für Deine Hilfe *verbeug*