developer_mts
(usa openSUSE)
Enviado em 17/09/2012 - 11:24h
Problema acesso alguns endereços https
Olá pessoal,
Recentemente coloquei aqui na empresa para funcionar um novo firewall e estou tendo problemas com alguns, não todos, sites que usam https.
Exemplos que não acessam:
https://login.yahoo.com,
https://addons.mozilla.org,
https://login.live.com https://carrinho.americanas.com.br/CustomerWeb/pages/Login
Exemplos que acessam:
https://mail.google.com https://www2.bancobrasil.com.br/aapf/login.jsp https://ssl-w03dnn0929.websiteseguro.com/Relativa/AtualizaCadastro.asp https://minha.unisul.br
Percebam que atualmente apenas o HTTP passa pelo proxy, HTTPS não passa.
Detalhe: no firewall, usando lynx todos os sites abrem. Na minha máquina (usando lynx, firefox ou chrome) ou em qualquer outra cliente da rede não acessa.
Será que tem haver com alguma configuração do meu firewall?
Estou usando:
Debian: 6.0.5
uname -a: Linux server1 2.6.32-5-amd64 #1 SMP Sun May 6 04:00:17 UTC 2012 x86_64 GNU/Linux
iptables: v1.4.8.
Squid Cache: Version 3.1.6
Iptables-save:
# Generated by iptables-save v1.4.8 on Mon Sep 17 09:48:44 2012
*mangle
:PREROUTING ACCEPT [10838:5980745]
:INPUT ACCEPT [1013:171099]
:FORWARD ACCEPT [9823:5806646]
:OUTPUT ACCEPT [841:231752]
:POSTROUTING ACCEPT [10505:6014416]
COMMIT
# Completed on Mon Sep 17 09:48:44 2012
# Generated by iptables-save v1.4.8 on Mon Sep 17 09:48:44 2012
*nat
:PREROUTING ACCEPT [228:15869]
:POSTROUTING ACCEPT [82:5564]
:OUTPUT ACCEPT [65:4576]
:PROXY - [0:0]
-A PREROUTING -s 192.168.1.0/24 -i eth0 -p tcp -m tcp --dport 80 -j PROXY
-A POSTROUTING -s 192.168.1.0/24 ! -d 192.168.1.0/24 -o ppp0 -j SNAT --to-source <ip_wan>
-A PROXY -d 200.201.0.0/16 -p tcp -j RETURN
-A PROXY -p tcp -j REDIRECT --to-ports 3128
COMMIT
# Completed on Mon Sep 17 09:48:44 2012
# Generated by iptables-save v1.4.8 on Mon Sep 17 09:48:44 2012
*filter
:INPUT DROP [80:6717]
:FORWARD DROP [88:4892]
:OUTPUT ACCEPT [840:232988]
:ANTI_IP_SPOOFING - [0:0]
:ICMP_REQUEST_CONTROL - [0:0]
:LAN_MAC_FILTER - [0:0]
:PING_FLOOD - [0:0]
:PING_OF_DEATH - [0:0]
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 1/sec -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p icmp -m recent --rcheck --seconds 300 --hitcount 3 --name ICMP_BL --rsource -j DROP
-A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8 -j ICMP_REQUEST_CONTROL
-A INPUT -s 127.0.0.0/8 -i ppp0 -j ANTI_IP_SPOOFING
-A INPUT -s 192.168.1.0/24 -i ppp0 -j ANTI_IP_SPOOFING
-A INPUT -s <ip_dns_autoritativo> -d <ip_wan> -i ppp0 -p udp -m udp --sport 53 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
-A INPUT -s <ip_dns_autoritativo> -d <ip_wan> -i ppp0 -p tcp -m tcp --sport 53 --dport 1024:65535 -m state --state ESTABLISHED -j ACCEPT
-A INPUT -s 192.168.1.0/24 -d 192.168.1.1/32 -i eth0 -p udp -m udp --sport 1024:65535 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -s 192.168.1.0/24 -d 192.168.1.1/32 -i eth0 -p udp -m udp --sport 53 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -i eth0 -p tcp -m state --state NEW -m multiport --dports 22,3128,10000 -j LAN_MAC_FILTER
-A INPUT -i eth0 -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -d <wan_ip> -i ppp0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK RST -m limit --limit 1/sec -j ACCEPT
-A FORWARD -p icmp -m recent --rcheck --seconds 300 --hitcount 3 --name ICMP_BL --rsource -j DROP
-A FORWARD -i eth0 -p icmp -m icmp --icmp-type 8 -j ICMP_REQUEST_CONTROL
-A FORWARD -i eth0 -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -i eth0 -p tcp -m state --state NEW -j LAN_MAC_FILTER
-A FORWARD -d 192.168.1.0/24 ! -i eth0 -p tcp -m state --state NEW -m multiport --dports 21,22,25,80,110,143,465,587,3389,5432 -j ACCEPT
-A FORWARD -d 192.168.1.0/24 -i ppp0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -p tcp -m tcp --dport 135 -j DROP
-A FORWARD -p udp -m udp --dport 137 -j DROP
-A FORWARD -p tcp -m tcp --dport 137 -j DROP
-A FORWARD -p udp -m udp --dport 138 -j DROP
-A FORWARD -p tcp -m tcp --dport 138 -j DROP
-A FORWARD -p udp -m udp --dport 139 -j DROP
-A FORWARD -p tcp -m tcp --dport 139 -j DROP
-A FORWARD -p tcp -m tcp --dport 445 -j DROP
-A FORWARD -d <ip_ftp_server> -i eth0 -p tcp -m tcp --dport 51000:51999 -m state --state NEW -j ACCEPT
-A FORWARD -d 192.168.1.0/24 ! -i eth0 -p tcp -m tcp --dport 5500:5514 -m state --state NEW -j ACCEPT
-A ANTI_IP_SPOOFING -j LOG --log-prefix "IP-SPOOFING > " --log-level 6
-A ANTI_IP_SPOOFING -j DROP
-A ICMP_REQUEST_CONTROL -m length --length 100:65535 -j PING_OF_DEATH
-A ICMP_REQUEST_CONTROL -m limit --limit 1/sec -j ACCEPT
-A ICMP_REQUEST_CONTROL -j PING_FLOOD
-A LAN_MAC_FILTER -s 192.168.1.2/32 -m mac --mac-source F4:6D:04:9F:9A:DF -j ACCEPT
-A LAN_MAC_FILTER -s 192.168.1.4/32 -m mac --mac-source 00:22:15:D7:E1:EA -j ACCEPT
# continua lista lan_mac_filter...
-A PING_FLOOD -j LOG --log-prefix "PING_FLOOD > " --log-level 6
-A PING_FLOOD -m recent --set --name ICMP_BL --rsource
-A PING_FLOOD -j REJECT --reject-with icmp-port-unreachable
-A PING_OF_DEATH -j LOG --log-prefix "PING_OF_DEATH > " --log-level 6
-A PING_OF_DEATH -m recent --set --name ICMP_BL --rsource
-A PING_OF_DEATH -j REJECT --reject-with icmp-port-unreachable
COMMIT
# Completed on Mon Sep 17 09:48:44 2012