-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Paco Gmail wrote: > vaya, es bastante raro > has tratado de entrar en esas páginas sin el proxy? porque puede que el > problema esté en otro sitio, quizás tengas un firewall impidiendote la salida > hacia esas páginas, porque eso de "no route to host", puede que tengas > bloqueada alguna cosa y no tenga que ver con el proxy. de todas formas, igual > en los logs del squid tienes alguna cosa, mira por ahí, a ver si encuentras > algo, y nos cuentas > saludos > paco > > > > On Fri, 24 Jun 2005 10:31:25 -0400 > Bismark Castilla <[EMAIL PROTECTED]> wrote: > > >>paco, me han revisado la conf y me han dicho que esta bien pero por >>algo no funciona, el squid funciona pero no en los sitios que usan >>conexiones seguras como por ejemplo 443(gmail.google.com), el error >>que me da es: >> >>While trying to retrieve the URL: www.google.com:443
^^^^^^^^^^^^^^^^como se tranforma gmail.google.com en www.google.com:443?????? Para mi alli esta el nudo >> >>The following error was encountered: >> >> * Connection Failed >> >>The system returned: >> >> (113) No route to host >> >>The remote host or network may be down. Please try the request again. >> >>aqui esta la configuracion de mi squid.conf la verdad es que no se que >>es lo que esta pasando. >> >>help :( >> >>#Default:http_port 3128 >>cache_peer 192.168.10.200 parent 1080 0 default no-query >>cache_peer_domain 192.168.10.200 !cav.jovenclub.cu >>#We recommend you to use the following two lines. >>acl QUERY urlpath_regex cgi-bin \? >>no_cache deny QUERY >>#Default: >>cache_mem 64 MB >>cache_swap_high 95 >>#Default: >>cache_dir ufs /var/spool/squid 100 16 256 >>#Default: >>cache_access_log /var/log/squid/access.log >>#Default: >>cache_log /var/log/squid/cache.log >>#Default: >>cache_store_log /var/log/squid/store.log >> >>auth_param basic program /usr/lib/squid/ncsa_auth /etc/squid/claves >> >>#Recommended minimum configuration: >>acl all src 0.0.0.0/0.0.0.0 >>acl manager proto cache_object >>acl localhost src 127.0.0.1/255.255.255.255 >>acl to_localhost dst 127.0.0.0/8 >>acl SSL_ports port 443 563 # https, snews >>acl SSL_ports port 873 # rsync >>acl Safe_ports port 80 # http >>acl Safe_ports port 21 # ftp >>acl Safe_ports port 443 563 # https, snews >>acl Safe_ports port 70 # gopher >>acl Safe_ports port 210 # wais >>acl Safe_ports port 1025-65535 # unregistered ports >>acl Safe_ports port 280 # http-mgmt >>acl Safe_ports port 488 # gss-http >>acl Safe_ports port 591 # filemaker >>acl Safe_ports port 777 # multiling http >>acl Safe_ports port 631 # cups >>acl Safe_ports port 873 # rsync >>acl Safe_ports port 901 # SWAT >>acl purge method PURGE >>acl CONNECT method CONNECT >> >> >>#Esto lo puse yo para pedir login y password >>acl clave_navegar proxy_auth REQUIRED >> >> >>acl nodo2 src 192.168.10.5 >>acl direccion src 192.168.10.40 >>acl jtec src 192.168.10.55 >> >>#Recommended minimum configuration: >># >># Only allow cachemgr access from localhost >>http_access allow manager localhost >>http_access deny manager >># Only allow purge requests from localhost >>http_access allow purge localhost >>http_access deny purge >># Deny requests to unknown ports >>http_access deny !Safe_ports >># Deny CONNECT to other than SSL ports >>http_access deny CONNECT !SSL_ports >> >># INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS >> >># Example rule allowing access from your local networks. Adapt >># to list your (internal) IP networks from where browsing should >># be allowed >>#acl our_networks src 192.168.1.0/24 192.168.2.0/24 >>#http_access allow our_networks >>http_access allow localhost >> >># Acceso a Internet basado en Autentificacion (Nombre de Usuario y Contrasena) >> >>http_access allow nodo2 >>http_access allow direccion >>http_access allow jtec >>http_access allow clave_navegar >> >># And finally deny all other access to this proxy >>http_access deny all > > > - -- Ricardo A.Frydman Consultor en Tecnología Open Source - Administrador de Sistemas jabber: [EMAIL PROTECTED] - http://www.eureka-linux.com.ar SIP # 1-747-667-9534 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCvC41kw12RhFuGy4RAhGwAJ9i1fW/NNszWzYT6yG1RZhhgtc41QCdEX/y LTkC4rkiD9vppiCaDAQiJtA= =jToX -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]