SquidGuard [RESOLVIDO]

13. Re: SquidGuard [RESOLVIDO]

Cicero de Sales Costa
Cicero199

(usa Outra)

Enviado em 13/03/2014 - 16:12h

Amigo segue abaixo o conteúdo do meu squidGuard.conf, tem algumas linhas comentadas por que antes não havia dado certo então voltei como era antes.





# CONFIG FILE FOR SQUIDGUARD
#

dbhome /var/lib/squidguard/db
logdir /var/log/squid

#time afterwork {
#weekly * 09:00-16:00
#}

#acl {
# all within afterwork {
# pass all
# }
# else {
# pass !bloqueado all
# }
#default {
# pass none
# redirect http://192.168.1.1/index.html
# }
#}


dest ads {
domainlist blacklists/ads/domains
urllist blacklists/ads/urls
}

dest adult {
domainlist blacklists/adult/domains
urllist blacklists/adult/urls
}

dest aggressive {
domainlist blacklists/aggressive/domains
urllist blacklists/aggressive/urls
}

dest antispyware {
domainlist blacklists/antispyware/domains
urllist blacklists/antispyware/urls
}

dest artnudes {
domainlist blacklists/artnudes/domains
urllist blacklists/artnudes/urls
}

dest astrology {
domainlist blacklists/astrology/domains
}

dest audio-video {
domainlist blacklists/audio-video/domains
urllist blacklists/audio-video/urls
}

dest banking {
domainlist blacklists/banking/domains
urllist blacklists/banking/urls
}

dest beerliquorinfo {
domainlist blacklists/beerliquorinfo/domains
}

dest beerliquorsale {
domainlist blacklists/beerliquorsale/domains
}

dest blog {
domainlist blacklists/blog/domains
urllist blacklists/blog/urls
}

dest cellphones {
domainlist blacklists/cellphones/domains
}

dest chat {
domainlist blacklists/chat/domains
urllist blacklists/chat/urls
}

dest childcare {
domainlist blacklists/childcare/domains
urllist blacklists/childcare/urls
}

dest cleaning {
domainlist blacklists/cleaning/domains
}

dest clothing {
domainlist blacklists/clothing/domains
}

dest culinary {
domainlist blacklists/culinary/domains
}

dest dating {
domainlist blacklists/dating/domains
urllist blacklists/dating/urls
}

dest desktopsillies {
domainlist blacklists/desktopsillies/domains
urllist blacklists/desktopsillies/urls
}

dest dialers {
domainlist blacklists/dialers/domains
urllist blacklists/dialers/urls
}

dest drugs {
domainlist blacklists/drugs/domains
urllist blacklists/drugs/urls
}

dest ecommerce {
domainlist blacklists/ecommerce/domains
urllist blacklists/ecommerce/urls
}

dest entertainment {
domainlist blacklists/entertainment/domains
urllist blacklists/entertainment/urls
}

dest filehosting {
domainlist blacklists/filehosting/domains
}

dest financial {
domainlist blacklists/financial/domains
}

dest frencheducation {
domainlist blacklists/frencheducation/domains
urllist blacklists/frencheducation/urls
}

dest gambling {
domainlist blacklists/gambling/domains
urllist blacklists/gambling/urls
}

dest games {
domainlist blacklists/games/domains
urllist blacklists/games/urls
}

dest gardening {
domainlist blacklists/gardening/domains
}

dest government {
domainlist blacklists/government/domains
urllist blacklists/government/urls
}

dest guns {
domainlist blacklists/guns/domains
urllist blacklists/guns/urls
}

dest hacking {
domainlist blacklists/hacking/domains
urllist blacklists/hacking/urls
}

dest homerepair {
domainlist blacklists/homerepair/domains
urllist blacklists/homerepair/urls
}

dest hygiene {
domainlist blacklists/hygiene/domains
}

dest instantmessaging {
domainlist blacklists/instantmessaging/domains
urllist blacklists/instantmessaging/urls
}

dest jewelry {
domainlist blacklists/jewelry/domains

}

dest jobsearch {
domainlist blacklists/jobsearch/domains
urllist blacklists/jobsearch/urls
}

dest kidstimewasting {
domainlist blacklists/kidstimewasting/domains
urllist blacklists/kidstimewasting/urls
}

dest mail {
domainlist blacklists/mail/domains
urllist blacklists/mail/urls
}

dest marketingware {
domainlist blacklists/marketingware/domains
}

dest medical {
domainlist blacklists/medical/domains
urllist blacklists/medical/urls
}

dest mixed_adult {
domainlist blacklists/mixed_adult/domains
}

dest mobile-phone {
domainlist blacklists/mobile-phone/domains
}

dest naturism {
domainlist blacklists/naturism/domains
urllist blacklists/naturism/urls
}

dest news {
domainlist blacklists/news/domains
urllist blacklists/news/urls
}

dest onlineauctions {
domainlist blacklists/onlineauctions/domains
}

dest onlinegames {
domainlist blacklists/onlinegames/domains
urllist blacklists/onlinegames/urls
}

dest onlinepayment {
domainlist blacklists/onlinepayment/domains
}

dest personalfinance {
domainlist blacklists/personalfinance/domains
urllist blacklists/personalfinance/urls
}

dest pets {
domainlist blacklists/pets/domains
urllist blacklists/pets/urls
}

dest phishing {
domainlist blacklists/phishing/domains
urllist blacklists/phishing/urls
}

dest [*****] {
domainlist blacklists/[*****]/domains
}

dest proxy {
domainlist blacklists/proxy/domains
urllist blacklists/proxy/urls
}

dest radio {
domainlist blacklists/radio/domains
urllist blacklists/radio/urls
}

dest reaffected {
domainlist blacklists/reaffected/domains
}

dest religion {
domainlist blacklists/religion/domains
urllist blacklists/religion/urls
}

dest ringtones {
domainlist blacklists/ringtones/domains
}

dest searchengines {
domainlist blacklists/searchengines/domains
}

dest sect {
domainlist blacklists/sect/domains
}

dest sexuality {
domainlist blacklists/sexuality/domains
urllist blacklists/sexuality/urls
}

dest shopping {
domainlist blacklists/shopping/domains
}

dest socialnetworking {
domainlist blacklists/socialnetworking/domains
urllist blacklists/socialnetworking/urls
}

dest sportnews {
domainlist blacklists/sportnews/domains
urllist blacklists/sportnews/urls
}

dest sports {
domainlist blacklists/sports/domains
urllist blacklists/sports/urls
}

dest spyware {
domainlist blacklists/spyware/domains
}

dest updatesites {
domainlist blacklists/updatesites/domains
urllist blacklists/updatesites/urls
}

dest vacation {
domainlist blacklists/vacation/domains
urllist blacklists/vacation/urls
}

dest verisign {
domainlist blacklists/verisign/domains
}

dest violence {
domainlist blacklists/violence/domains
urllist blacklists/violence/urls
}

dest virusinfected {
domainlist blacklists/virusinfected/domains
urllist blacklists/virusinfected/urls
}

dest warez {
domainlist blacklists/warez/domains
urllist blacklists/warez/urls
}

dest weapons {
domainlist blacklists/weapons/domains
urllist blacklists/weapons/urls
}

dest weather {
domainlist blacklists/weather/domains
urllist blacklists/weather/urls
}

dest webmail {
domainlist blacklists/webmail/domains
urllist blacklists/webmail/urls
}

dest whitelist {
domainlist blacklists/whitelist/domains
urllist blacklists/whitelist/urls
}
dest bloqueado {
domainlist blacklists/bloqueado/domains
}

dest liberado {
domainlist blacklists/liberado/domains
}

src livres {
iplist livres
}


acl {
livres {

pass !bloqueado
}

default {
pass ads liberado !bloqueado !adult !aggressive !antispyware !artnudes astrology audio-video banking beerliquorinfo beerliquorsale blog cellphones chat childcare cleaning clothing culinary dating desktopsillies dialers !drugs ecommerce entertainment !filehosting financial frencheducation !gambling !games gardening government !guns !hacking homerepair hygiene instantmessaging jewelry jobsearch kidstimewasting mail marketingware medical !mixed_adult mobile-phone naturism news onlineauctions !onlinegames !onlinepayment personalfinance pets phishing ![*****] proxy radio reaffected religion ringtones searchengines sect !sexuality shopping socialnetworking sportnews sports !spyware !updatesites vacation verisign !violence !virusinfected !warez !weapons weather webmail whitelist all
redirect http://192.168.1.1/index.html
}
}



  


14. Re: SquidGuard [RESOLVIDO]

Eduardo Paim Silveira
eduardo

(usa Linux Mint)

Enviado em 13/03/2014 - 16:39h

Cicero199 escreveu:

Amigo segue abaixo o conteúdo do meu squidGuard.conf, tem algumas linhas comentadas por que antes não havia dado certo então voltei como era antes.




dest bloqueado {
domainlist blacklists/bloqueado/domains
}

dest liberado {
domainlist blacklists/liberado/domains
}

src livres {
iplist livres
}

time horario_de_trabalho {
weekly * 09:00-16:00
}


acl {
livres {

pass !bloqueado
}
default within horario_de_trabalho {
pass ads liberado !bloqueado !adult !aggressive !antispyware !artnudes astrology audio-video banking beerliquorinfo beerliquorsale blog cellphones chat childcare cleaning clothing culinary dating desktopsillies dialers !drugs ecommerce entertainment !filehosting financial frencheducation !gambling !games gardening government !guns !hacking homerepair hygiene instantmessaging jewelry jobsearch kidstimewasting mail marketingware medical !mixed_adult mobile-phone naturism news onlineauctions !onlinegames !onlinepayment personalfinance pets phishing ![*****] proxy radio reaffected religion ringtones searchengines sect !sexuality shopping socialnetworking sportnews sports !spyware !updatesites vacation verisign !violence !virusinfected !warez !weapons weather webmail whitelist all
redirect http://192.168.1.1/index.html
} else {
pass all
redirect http://192.168.1.1/index.html
}
}


Dá uma olhada ai no fim do teu .conf. A ideia é que os default, no horário de trabalho, tem bloqueios. Fora do horário, libera tudo.


15. Re: SquidGuard [RESOLVIDO]

Cicero de Sales Costa
Cicero199

(usa Outra)

Enviado em 13/03/2014 - 16:43h

É isso mesmo que quero! No horário de trabalho (acesso limitado) fora do horário (acesso total).Vou editar aqui e jogar no meu servidor para ver se funciona!


16. Re: SquidGuard [RESOLVIDO]

Eduardo Paim Silveira
eduardo

(usa Linux Mint)

Enviado em 13/03/2014 - 16:46h

Cicero199 escreveu:

É isso mesmo que quero! No horário de trabalho (acesso limitado) fora do horário (acesso total).Vou editar aqui e jogar no meu servidor para ver se funciona!


Tu entendeu como ficou? É importante que tu entenda, para poder personalizar as regras conforme tu precisar. ;)


17. Re: SquidGuard [RESOLVIDO]

Eduardo Paim Silveira
eduardo

(usa Linux Mint)

Enviado em 13/03/2014 - 16:49h

Ah, correção: tua acl "livres" falta uma ação. Olha como está e como deve ser.

livres {

pass !bloqueado
}


livres {

pass !bloqueado all
}

(passa, exceto bloqueados, tudo)


18. Re: SquidGuard [RESOLVIDO]

Cicero de Sales Costa
Cicero199

(usa Outra)

Enviado em 13/03/2014 - 17:09h

É amigo não deu certo, continua passando tudo!


19. Re: SquidGuard [RESOLVIDO]

Eduardo Paim Silveira
eduardo

(usa Linux Mint)

Enviado em 13/03/2014 - 17:55h

Olhe o squidGuard.log para ver se não tem nenhum erro. Tu está apontando para os arquivos de IP e sites corretamente? Verifique se o horário do servidor está correto também. Outra coisa, sempre que modificar o squidGuard.conf é necessário executar novamente o comando "squidGuard -C all". E depois reiniciar o squid.


20. Re: SquidGuard [RESOLVIDO]

Cicero de Sales Costa
Cicero199

(usa Outra)

Enviado em 14/03/2014 - 15:11h

Hehe amigo muito obrigado pela ajuda, já fiz tudo isso que disse. Mas agora estou com outro problema aqui, o servidor de firewall está travando toda a minha rede.



01 02



Patrocínio

Site hospedado pelo provedor RedeHost.
Linux banner

Destaques

Artigos

Dicas

Tópicos

Top 10 do mês

Scripts