伪配置mod_rewrite / mod_proxy与squid代理

时间:2012-05-23 10:39:03

标签: mod-rewrite mod-proxy squid

我们正在为我们的某个应用程序使用squid,并且我们收到来自网站He used xrumer or other Tools or had a false configured mod_rewrite/mod_proxy who is abused的滥用消息。

我们怀疑是否有其他人代表我们使用这些squid代理,或者这些配置实际上没有正确设置。我对squid或Apache mod规则没有多少经验。

可能是什么问题?

squid.conf是

#######
####### Recommended minimum Access Permission configuration:
#######
####### Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager
####### Deny requests to certain unsafe ports
http_access deny !Safe_ports
####### Deny CONNECT to other than secure SSL ports
http_access deny CONNECT !SSL_ports
####### We strongly recommend the following be uncommented to protect innocent
####### web applications running on the proxy server who think the only
####### one who can access services on "localhost" is a local user
#######http_access deny to_localhost
#######
####### Recommended minimum configuration:
#######
acl all src all
acl manager proto cache_object
acl localhost src 127.0.0.1/32 ::1
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32 ::1
####### Example rule allowing access from your local networks.
####### Adapt to list your (internal) IP networks from where browsing
####### should be allowed
acl localnet src 10.0.0.0/8     ####### RFC1918 possible internal network
acl localnet src 172.16.0.0/12  ####### RFC1918 possible internal network
acl localnet src 192.168.0.0/16 ####### RFC1918 possible internal network
acl localnet src fc00::/7       ####### RFC 4193 local private network range
acl localnet src fe80::/10      ####### RFC 4291 link-local (directly plugged) machines
acl SSL_ports port 443
acl Safe_ports port 80          ####### http
acl Safe_ports port 21          ####### ftp
acl Safe_ports port 443         ####### https
acl Safe_ports port 70          ####### gopher
acl Safe_ports port 210         ####### wais
acl Safe_ports port 1025-65535  ####### unregistered ports
acl Safe_ports port 280         ####### http-mgmt
acl Safe_ports port 488         ####### gss-http
acl Safe_ports port 591         ####### filemaker
acl Safe_ports port 777         ####### multiling http
acl CONNECT method CONNECT
#######
####### INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#######
####### Example rule allowing access from your local networks.
####### Adapt localnet in the ACL section to list your (internal) IP networks
####### from where browsing should be allowed
http_access allow localnet
http_access allow localhost
####### Changed by XYZ (XYZ@ABC) to allow http_access from ALL
http_access allow all
####### And finally deny all other access to this proxy. Changed by Ankit Narang (ankitn@amazon.com).
#######http_access deny all
####### Squid normally listens to port 3128
http_port 80
####### We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?
####### Uncomment and adjust the following to add a disk cache directory.
#######cache_dir ufs /var/spool/squid 100 16 256
####### Leave coredumps in the first cache dir
coredump_dir /var/spool/squid
####### Add any of your own refresh_pattern entries above these.
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern -i (/cgi-bin/|\?) 0     0%      0
refresh_pattern .               0       20%     4320
####### Changed by Ankit Narang (ankitn@amazon.com)
forwarded_for off
access_log none
#######Making Squid an anonymous proxy
request_header_access Allow allow all 
request_header_access Authorization allow all 
request_header_access WWW-Authenticate allow all 
request_header_access Proxy-Authorization allow all 
request_header_access Proxy-Authenticate allow all 
request_header_access Cache-Control allow all 
request_header_access Content-Encoding allow all 
request_header_access Content-Length allow all 
request_header_access Content-Type allow all 
request_header_access Date allow all 
request_header_access Expires allow all 
request_header_access Host allow all 
request_header_access If-Modified-Since allow all 
request_header_access Last-Modified allow all 
request_header_access Location allow all 
request_header_access Pragma allow all 
request_header_access Accept allow all 
request_header_access Accept-Charset allow all 
request_header_access Accept-Encoding allow all 
request_header_access Accept-Language allow all 
request_header_access Content-Language allow all 
request_header_access Mime-Version allow all 
request_header_access Retry-After allow all 
request_header_access Title allow all 
request_header_access Connection allow all 
request_header_access Proxy-Connection allow all 
request_header_access User-Agent allow all 
request_header_access Cookie allow all 
request_header_access All deny all

提前致谢。

1 个答案:

答案 0 :(得分:0)

http_access allow all

这是明确错误的。您已配置了一个开放代理,因此世界上的每个人都可以使用您的代理来浏览网页。当你必须以某种方式限制访问时,我完全不知道你的情景。

例如,如果您使用Squid作为反向代理,则应仅允许访问后端Web服务器:

acl webserver dst x.x.x.x
http_access allow webserver
http_access deny all

如果您使用代理作为转发代理来浏览网页:

acl mynetwork src x.x.x.x / y http_access允许mynetwork http_access拒绝所有

您可以使用身份验证。