modifacl
This commit is contained in:
parent
816c3b2825
commit
6968c19b76
@ -2,4 +2,4 @@
|
|||||||
|
|
||||||
files="./etc/crontab
|
files="./etc/crontab
|
||||||
|
|
||||||
0 2-3 * * * root scriptsauvegarde.sh
|
0 2 * * * /root/scriptsauvegarde.sh
|
@ -1353,178 +1353,12 @@ acl Safe_ports port 488 # gss-http
|
|||||||
acl Safe_ports port 591 # filemaker
|
acl Safe_ports port 591 # filemaker
|
||||||
acl Safe_ports port 777 # multiling http
|
acl Safe_ports port 777 # multiling http
|
||||||
|
|
||||||
acl mots_cles_refuses url_regex -i twitch chatgpt
|
# acl mots_cles_refuses url_regex -i twitch chatgpt
|
||||||
|
acl mots_cles_refuses url_regex -i youtube discord twitch facebook instagram snapchat
|
||||||
|
acl ip_restreintes src 172.16.0.5-172.16.0.99
|
||||||
|
|
||||||
# TAG: proxy_protocol_access
|
http_access deny ip_restreintes mots_cles_refuses
|
||||||
# Determine which client proxies can be trusted to provide correct
|
http_access allow localnet
|
||||||
# information regarding real client IP address using PROXY protocol.
|
|
||||||
#
|
|
||||||
# Requests may pass through a chain of several other proxies
|
|
||||||
# before reaching us. The original source details may by sent in:
|
|
||||||
# * HTTP message Forwarded header, or
|
|
||||||
# * HTTP message X-Forwarded-For header, or
|
|
||||||
# * PROXY protocol connection header.
|
|
||||||
#
|
|
||||||
# This directive is solely for validating new PROXY protocol
|
|
||||||
# connections received from a port flagged with require-proxy-header.
|
|
||||||
# It is checked only once after TCP connection setup.
|
|
||||||
#
|
|
||||||
# A deny match results in TCP connection closure.
|
|
||||||
#
|
|
||||||
# An allow match is required for Squid to permit the corresponding
|
|
||||||
# TCP connection, before Squid even looks for HTTP request headers.
|
|
||||||
# If there is an allow match, Squid starts using PROXY header information
|
|
||||||
# to determine the source address of the connection for all future ACL
|
|
||||||
# checks, logging, etc.
|
|
||||||
#
|
|
||||||
# SECURITY CONSIDERATIONS:
|
|
||||||
#
|
|
||||||
# Any host from which we accept client IP details can place
|
|
||||||
# incorrect information in the relevant header, and Squid
|
|
||||||
# will use the incorrect information as if it were the
|
|
||||||
# source address of the request. This may enable remote
|
|
||||||
# hosts to bypass any access control restrictions that are
|
|
||||||
# based on the client's source addresses.
|
|
||||||
#
|
|
||||||
# This clause only supports fast acl types.
|
|
||||||
# See http://wiki.squid-cache.org/SquidFaq/SquidAcl for details.
|
|
||||||
#Default:
|
|
||||||
# all TCP connections to ports with require-proxy-header will be denied
|
|
||||||
|
|
||||||
# TAG: follow_x_forwarded_for
|
|
||||||
# Determine which client proxies can be trusted to provide correct
|
|
||||||
# information regarding real client IP address.
|
|
||||||
#
|
|
||||||
# Requests may pass through a chain of several other proxies
|
|
||||||
# before reaching us. The original source details may by sent in:
|
|
||||||
# * HTTP message Forwarded header, or
|
|
||||||
# * HTTP message X-Forwarded-For header, or
|
|
||||||
# * PROXY protocol connection header.
|
|
||||||
#
|
|
||||||
# PROXY protocol connections are controlled by the proxy_protocol_access
|
|
||||||
# directive which is checked before this.
|
|
||||||
#
|
|
||||||
# If a request reaches us from a source that is allowed by this
|
|
||||||
# directive, then we trust the information it provides regarding
|
|
||||||
# the IP of the client it received from (if any).
|
|
||||||
#
|
|
||||||
# For the purpose of ACLs used in this directive the src ACL type always
|
|
||||||
# matches the address we are testing and srcdomain matches its rDNS.
|
|
||||||
#
|
|
||||||
# On each HTTP request Squid checks for X-Forwarded-For header fields.
|
|
||||||
# If found the header values are iterated in reverse order and an allow
|
|
||||||
# match is required for Squid to continue on to the next value.
|
|
||||||
# The verification ends when a value receives a deny match, cannot be
|
|
||||||
# tested, or there are no more values to test.
|
|
||||||
# NOTE: Squid does not yet follow the Forwarded HTTP header.
|
|
||||||
#
|
|
||||||
# The end result of this process is an IP address that we will
|
|
||||||
# refer to as the indirect client address. This address may
|
|
||||||
# be treated as the client address for access control, ICAP, delay
|
|
||||||
# pools and logging, depending on the acl_uses_indirect_client,
|
|
||||||
# icap_uses_indirect_client, delay_pool_uses_indirect_client,
|
|
||||||
# log_uses_indirect_client and tproxy_uses_indirect_client options.
|
|
||||||
#
|
|
||||||
# This clause only supports fast acl types.
|
|
||||||
# See http://wiki.squid-cache.org/SquidFaq/SquidAcl for details.
|
|
||||||
#
|
|
||||||
# SECURITY CONSIDERATIONS:
|
|
||||||
#
|
|
||||||
# Any host from which we accept client IP details can place
|
|
||||||
# incorrect information in the relevant header, and Squid
|
|
||||||
# will use the incorrect information as if it were the
|
|
||||||
# source address of the request. This may enable remote
|
|
||||||
# hosts to bypass any access control restrictions that are
|
|
||||||
# based on the client's source addresses.
|
|
||||||
#
|
|
||||||
# For example:
|
|
||||||
#
|
|
||||||
# acl localhost src 127.0.0.1
|
|
||||||
# acl my_other_proxy srcdomain .proxy.example.com
|
|
||||||
# follow_x_forwarded_for allow localhost
|
|
||||||
# follow_x_forwarded_for allow my_other_proxy
|
|
||||||
#Default:
|
|
||||||
# X-Forwarded-For header will be ignored.
|
|
||||||
|
|
||||||
# TAG: acl_uses_indirect_client on|off
|
|
||||||
# Controls whether the indirect client address
|
|
||||||
# (see follow_x_forwarded_for) is used instead of the
|
|
||||||
# direct client address in acl matching.
|
|
||||||
#
|
|
||||||
# NOTE: maxconn ACL considers direct TCP links and indirect
|
|
||||||
# clients will always have zero. So no match.
|
|
||||||
#Default:
|
|
||||||
# acl_uses_indirect_client on
|
|
||||||
|
|
||||||
# TAG: delay_pool_uses_indirect_client on|off
|
|
||||||
# Controls whether the indirect client address
|
|
||||||
# (see follow_x_forwarded_for) is used instead of the
|
|
||||||
# direct client address in delay pools.
|
|
||||||
#Default:
|
|
||||||
# delay_pool_uses_indirect_client on
|
|
||||||
|
|
||||||
# TAG: log_uses_indirect_client on|off
|
|
||||||
# Controls whether the indirect client address
|
|
||||||
# (see follow_x_forwarded_for) is used instead of the
|
|
||||||
# direct client address in the access log.
|
|
||||||
#Default:
|
|
||||||
# log_uses_indirect_client on
|
|
||||||
|
|
||||||
# TAG: tproxy_uses_indirect_client on|off
|
|
||||||
# Controls whether the indirect client address
|
|
||||||
# (see follow_x_forwarded_for) is used instead of the
|
|
||||||
# direct client address when spoofing the outgoing client.
|
|
||||||
#
|
|
||||||
# This has no effect on requests arriving in non-tproxy
|
|
||||||
# mode ports.
|
|
||||||
#
|
|
||||||
# SECURITY WARNING: Usage of this option is dangerous
|
|
||||||
# and should not be used trivially. Correct configuration
|
|
||||||
# of follow_x_forwarded_for with a limited set of trusted
|
|
||||||
# sources is required to prevent abuse of your proxy.
|
|
||||||
#Default:
|
|
||||||
# tproxy_uses_indirect_client off
|
|
||||||
|
|
||||||
# TAG: spoof_client_ip
|
|
||||||
# Control client IP address spoofing of TPROXY traffic based on
|
|
||||||
# defined access lists.
|
|
||||||
#
|
|
||||||
# spoof_client_ip allow|deny [!]aclname ...
|
|
||||||
#
|
|
||||||
# If there are no "spoof_client_ip" lines present, the default
|
|
||||||
# is to "allow" spoofing of any suitable request.
|
|
||||||
#
|
|
||||||
# Note that the cache_peer "no-tproxy" option overrides this ACL.
|
|
||||||
#
|
|
||||||
# This clause supports fast acl types.
|
|
||||||
# See http://wiki.squid-cache.org/SquidFaq/SquidAcl for details.
|
|
||||||
#Default:
|
|
||||||
# Allow spoofing on all TPROXY traffic.
|
|
||||||
|
|
||||||
# TAG: http_access
|
|
||||||
# Allowing or Denying access based on defined access lists
|
|
||||||
#
|
|
||||||
# To allow or deny a message received on an HTTP, HTTPS, or FTP port:
|
|
||||||
# http_access allow|deny [!]aclname ...
|
|
||||||
#
|
|
||||||
# NOTE on default values:
|
|
||||||
#
|
|
||||||
# If there are no "access" lines present, the default is to deny
|
|
||||||
# the request.
|
|
||||||
#
|
|
||||||
# If none of the "access" lines cause a match, the default is the
|
|
||||||
# opposite of the last line in the list. If the last line was
|
|
||||||
# deny, the default is allow. Conversely, if the last line
|
|
||||||
# is allow, the default will be deny. For these reasons, it is a
|
|
||||||
# good idea to have an "deny all" entry at the end of your access
|
|
||||||
# lists to avoid potential confusion.
|
|
||||||
#
|
|
||||||
# This clause supports both fast and slow acl types.
|
|
||||||
# See http://wiki.squid-cache.org/SquidFaq/SquidAcl for details.
|
|
||||||
#
|
|
||||||
#Default:
|
|
||||||
# Deny, unless rules exist in squid.conf.
|
|
||||||
#
|
|
||||||
|
|
||||||
#
|
#
|
||||||
# Recommended minimum Access Permission configuration:
|
# Recommended minimum Access Permission configuration:
|
||||||
@ -1552,9 +1386,9 @@ include /etc/squid/conf.d/*.conf
|
|||||||
# Example rule allowing access from your local networks.
|
# Example rule allowing access from your local networks.
|
||||||
# Adapt localnet in the ACL section to list your (internal) IP networks
|
# Adapt localnet in the ACL section to list your (internal) IP networks
|
||||||
# from where browsing should be allowed
|
# from where browsing should be allowed
|
||||||
http_access deny mots_cles_refuses
|
# http_access deny mots_cles_refuses
|
||||||
http_access allow localnet
|
# http_access allow localnet
|
||||||
http_access allow localhost
|
# http_access allow localhost
|
||||||
|
|
||||||
|
|
||||||
# And finally deny all other access to this proxy
|
# And finally deny all other access to this proxy
|
||||||
|
Loading…
x
Reference in New Issue
Block a user