2013-03-07 - Re: [GRASE-Hotspot] Running again (squid log issue)
Header Data
From: Paul van Oijen <Pa***n@abnamrocomfin.com>
Message Hash: 377415a197a29c7eafefd8d6f88bb4103a6add8367268f32f9355f3c717b20f7
Message ID: <CDE0808EBF803548968A157E73EF1A5D16A4FD5005@nlvwdbacfexc01>
Reply To: N/A
UTC Datetime: 2013-03-07 07:45:05 UTC
Raw Date: Thu, 07 Mar 2013 15:45:05 +0100
Raw message
Thanks Hernán,
I checked the iptables but I do not understand a few items...
10.1.0.0/24 is used ??? where does that come from.
Here some detailed info
cat /var/run/chilli.tun0.sh:
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 3990 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 4990 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 80 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 443 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 22 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 2812 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 53 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 3990 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p tcp -m tcp --dport 3128 --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 -p udp -d 255.255.255.255 --destination-port 67:68 -j ACCEPT
iptables -D INPUT -i tun0 -p udp -d 10.1.0.1 --destination-port 67:68 -j ACCEPT
iptables -D INPUT -i tun0 -p udp --dst 10.1.0.1 --dport 53 -j ACCEPT
iptables -D INPUT -i tun0 -p icmp --dst 10.1.0.1 -j ACCEPT
iptables -D INPUT -i tun0 --dst 10.1.0.1 -j DROP
iptables -D INPUT -i eth1 -j DROP
iptables -D FORWARD -i eth1 -j DROP
iptables -D FORWARD -o eth1 -j DROP
iptables -D FORWARD -i tun0 -j ACCEPT
iptables -D FORWARD -o tun0 -j ACCEPT
iptables -D FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
iptables -D FORWARD -t mangle -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
iptables -D FORWARD -i tun0 ! -o eth0 -j DROP
iptables -D PREROUTING -t mangle -p tcp -s 10.1.0.0/255.255.255.0 -d 10.1.0.1 --dport 3128 -j DROP
iptables -D PREROUTING -t nat -i tun0 -p tcp -s 10.1.0.0/255.255.255.0 -d ! 10.1.0.1 --dport 80 -j REDIRECT --to 3128
iptables -D POSTROUTING -t nat -o eth0 -j MASQUERADE
The last 3 lines should take care of forcing data to the squid port if I am right but why 10.1.0.0/24.
my ifconfig: (striped a bit)
eth0 Link encap:Ethernet HWaddr 00:e0:4c:1f:9b:50
inet addr:192.168.1.80 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::2e0:4cff:fe1f:9b50/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1583768 errors:0 dropped:0 overruns:0 frame:0
TX packets:858271 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1596673044 (1.5 GB) TX bytes:89996844 (89.9 MB)
Interrupt:18 Base address:0x4f00
eth1 Link encap:Ethernet HWaddr 00:18:8b:04:fe:34
inet6 addr: fe80::218:8bff:fe04:fe34/64 Scope:Link
UP BROADCAST RUNNING MTU:1500 Metric:1
RX packets:864957 errors:0 dropped:0 overruns:0 frame:0
TX packets:1532784 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:97291156 (97.2 MB) TX bytes:1540896545 (1.5 GB)
Interrupt:16
tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:10.1.0.1 P-t-P:10.1.0.1 Mask:255.255.255.0
UP POINTOPOINT RUNNING MTU:1500 Metric:1
RX packets:799007 errors:0 dropped:0 overruns:0 frame:0
TX packets:1503954 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:74906726 (74.9 MB) TX bytes:1511435565 (1.5 GB)
The ipup.sh script
#!/bin/sh
# Custom rules for Hotspot
# TRANS PROXY
# ipt -I PREROUTING -t nat -p tcp -s 10.1.0.0/24 -d 10.1.0.1 --dport 3128 -j DROP
# ipt -I PREROUTING -t nat -i $IF -p tcp -s 10.1.0.0/24 -d ! 10.1.0.1 --dport 80 -j REDIRECT --to 8080
# Redirect to Squid proxy (drop direct attempts to proxy)
ipt -I PREROUTING -t mangle -p tcp -s $NET/$MASK -d $ADDR --dport 3128 -j DROP
ipt -I PREROUTING -t nat -i $TUNTAP -p tcp -s $NET/$MASK -d ! $ADDR --dport 80 -j REDIRECT --to 3128
# Look at using this rule?
# ipt -I PREROUTING -t nat -i $TUNTAP -p tcp -s $NET/$MASK -d ! $ADDR --dport 80 -j DNAT --to 192.168.8.22:3128
# Redirect DNS to local server # Coova Chilli seems to take care of this
# ipt -I PREROUTING -t nat -i $TUNTAP -p tcp -s $NET/$MASK -d ! $ADDR --dport 53 -j REDIRECT --to 53
# ipt -I PREROUTING -t nat -i $TUNTAP -p udp -s $NET/$MASK -d ! $ADDR --dport 53 -j REDIRECT --to 53
# MASQUERADE
# WAS ON
# echo 1 > /proc/sys/net/ipv4/ip_forward maybe set to 0
#
ipt -I POSTROUTING -t nat -o $HS_WANIF -j MASQUERADE
This results in the last 3 lines of the cat /var/run/chilli.tun0.sh output as mentioned above.
iptables -L
#Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP all -- anywhere anywhere
ACCEPT icmp -- anywhere 10.1.0.1
ACCEPT udp -- anywhere 10.1.0.1 udp dpt:domain
ACCEPT udp -- anywhere 10.1.0.1 udp dpts:bootps:bootpc
ACCEPT udp -- anywhere 255.255.255.255 udp dpts:bootps:bootpc
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:3128
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:3990
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:domain
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:2812
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:ssh
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:https
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:http
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:4990
ACCEPT tcp -- anywhere 10.1.0.1 tcp dpt:3990
DROP all -- anywhere 10.1.0.1
Chain FORWARD (policy ACCEPT)
target prot opt source destination
DROP all -- anywhere anywhere
TCPMSS tcp -- anywhere anywhere tcpflags: SYN,RST/SYN TCPMSS clamp to PMTU
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
The up.sh scripts
#!/bin/sh
TUNTAP=$(basename $DEV)
UNDO_FILE=/var/run/chilli.$TUNTAP.sh
.........
Blabla blabla
.........
# site specific stuff optional
[ -e /etc/chilli/ipup.sh ] && . /etc/chilli/ipup.sh
The last lines should take care of the start for squid rules....
Maybe someone can shine a lite on this.....
Chrs
Ps What are these ports as they are not active on tcp:
tcp dpt:4990
tcp dpt:3990
------------
It seems as if they had erased the iptables, then gives access to your case without going through the squid service. You should start reviewing it. I hope I have been helpful.
Hernán Lozano
De: Drazen [drazen.zuvela@...]
Enviado el: jueves, 07 de marzo de 2013 06:01 a.m.
Para: GRASE Hotspot General Discussions
Asunto: Re: [GRASE-Hotspot] Running again (squid log issue)
Hi Paul,
I just did try to stop squid. It succeed. Then checked with my android
phone to connect. It went smothly. Internet access was allowed. At the
log page of adminstrator interface I could see connected android, but no
details recorded . What was correct assume.
Just intend to go further with testing, when one real client reported
problem with connection. It was W7 client. I checked personally at his
NB . Connection was alive, but has no acces to the internet.
So, I had to stop any further testing, because of him and also noticed
several iPhones online, all important roles in company, so I stopped
further testing. Squid started again, and everything went in order.
cat /proc/sys/net/ipv4/ip_forward
returned "1"
Sorry can't help you more at the moment.
Drazen
On 7.3.2013 9:32, Paul van Oijen wrote:
> Hai Drazen,
>
> I have no logging whatsoever from the hotspot anymore. Also the show all sessions will not show historic activities. It only show the amount of total data. (that's in the sql)
> On the older version I ran some stats tools using the access.log file from squid. It is in /var/log/squid3/access.log (which now stays empty)
> But it would be good to know if others also simply can turn of squid without any effect (I saw another post which sounds like the same issue).
> Maybe you could test it for me by simply entering 'service squid3 stop' on your hotspot and if any issue rise simply start it again with 'service squid3 start' on my site squid is simply not being used with Grase at the time (since 3.7.7.6)
> It's now just with IP forward. If I disable ipforward than the hotspot stops redirecting requests. You can test that with:
>
> cat /proc/sys/net/ipv4/ip_forward
> if it says 1 its being enabled if 0 its disabled I am sure it would say 1
>
> If you do:
>
> 'echo 0 > /proc/sys/net/ipv4/ip_forward' you would see after a few seconds the hotspot stops.
> Doing 'echo 1 > /proc/sys/net/ipv4/ip_forward' will enabled it again and the hotspot works again after a few seconds
>
> Pity as I liked squid in between (also for scanning and anti adds)
>
> Chrs
>
> -----------
>
> Hi Paul,
> Timothy wrote before about new way of session log displaying and filtering.
> Default view of session page is showing only active ones in new version.
> If no active conns. at the moment , nothing is showed.
> There is a switch to all session view at the top-left edge of session
> log frame. It says "Display All Sessions"
> Try that.
>
> Well, which log file is written actually? That part I don't know because
> ever need it yet.
>
> Rgds.
> Drazen
>
> -----Oorspronkelijk bericht-----
> Van: Paul van Oijen
> Verzonden: woensdag 6 maart 2013 10:21
> Aan: 'grase-hotspot@...'
> Onderwerp: RE: Running again (squid log issue)
>
> Hello,
>
> Just stopped squid3 (service squid3 stop) and to my amazement the hotspot is not even using Squid so all traffic goes directly. (ip forwarding ??) In the old version squid was still used and produced all stats.
>
> Is this indeed been disabled in this release or did something else happen?
>
> Chrs
>
> -----Oorspronkelijk bericht-----
> Van: Paul van Oijen
> Verzonden: dinsdag 5 maart 2013 16:42
> Aan: 'grase-hotspot@...'
> Onderwerp: Running again (squid log issue)
>
> Hello,
>
> Another issues rose.. the hotspot is now running ok but the access.log from squid stays empty.
> If I telnet to port 3128 from the local machine I see an entry but not from end users..
>
> What am I missing....?
>
> Chrs
>
>
http://www.abnamrocomfin.com/maildisclaimer
Thread
-
Return to March 2013
- Return to ““Lozano, Hernán” <hl***o@cetsa.com.ar>”
- Return to “Paul van Oijen <Pa***n@abnamrocomfin.com>”
-
Return to “Tim White <ti***8@gmail.com>”
- 2013-03-07 (Thu, 07 Mar 2013 15:45:05 +0100) - Re: [GRASE-Hotspot] Running again (squid log issue) - Paul van Oijen <Pa***n@abnamrocomfin.com>
- 2013-03-07 (Thu, 07 Mar 2013 16:54:49 +0000) - Re: [GRASE-Hotspot] Running again (squid log issue) - “Lozano, Hernán” <hl***o@cetsa.com.ar>
- 2013-03-07 (Fri, 08 Mar 2013 08:12:43 +1000) - Re: [GRASE-Hotspot] Running again (squid log issue) - Tim White <ti***8@gmail.com>