Все вроде бы настроил ... но сквид через некоторое время вылетает с ошибкой ... и простая команда /usr/local/etc/rc.d/squid restart или stop
не тормозит его

В логах cache.log
Код: Выделить всё
.....
2015/04/13 21:59:59| pinger: Initialising ICMP pinger ...
2015/04/13 21:59:59| pinger: ICMP socket opened.
2015/04/13 22:00:00 kid1| storeLateRelease: released 0 objects
2015/04/13 22:00:23| Current Directory is /var/run/squid
[b]FATAL: Received Segment Violation...dying.[/b]
2015/04/13 22:00:23 kid1| Closing HTTP port 0.0.0.0:3128
2015/04/13 22:00:23 kid1| storeDirWriteCleanLogs: Starting...
2015/04/13 22:00:23 kid1| Finished. Wrote 148 entries.
2015/04/13 22:00:23 kid1| Took 0.00 seconds (564885.50 entries/sec).
CPU Usage: 0.085 seconds = 0.042 user + 0.042 sys
Maximum Resident Size: 256960 KB
Page faults with physical i/o: 0
.....
Код: Выделить всё
root@srv:/usr/ports/www/squid/files# squid -v
Squid Cache: Version 3.4.12
configure options: '--with-default-user=squid' '--bindir=/usr/local/sbin' '--sbindir=/usr/local/sbin' '--datadir=/usr/local/etc/squid' '--libexecdir=/usr/local/libexec/squid' '--localstatedir=/var' '--sysconfdir=/usr/local/etc/squid' '--with-logdir=/var/log/squid' '--with-pidfile=/var/run/squid/squid.pid' '--with-swapdir=/var/squid/cache' '--enable-auth' '--enable-build-info' '--enable-loadable-modules' '--enable-removal-policies=lru heap' '--disable-epoll' '--disable-linux-netfilter' '--disable-linux-tproxy' '--disable-translation' '--disable-arch-native' '--enable-eui' '--enable-cache-digests' '--enable-delay-pools' '--disable-internal-dns' '--disable-ecap' '--disable-esi' '--disable-follow-x-forwarded-for' '--enable-htcp' '--disable-icap-client' '--enable-icmp' '--enable-ident-lookups' '--disable-ipv6' '--enable-kqueue' '--without-large-files' '--disable-http-violations' '--without-nettle' '--enable-snmp' '--disable-ssl' '--disable-ssl-crtd' '--disable-stacktraces' '--disable-ipf-transparent' '--disable-ipfw-transparent' '--enable-pf-transparent' '--with-nat-devpf' '--disable-forw-via-db' '--enable-wccp' '--enable-wccpv2' '--enable-auth-basic=DB MSNT MSNT-multi-domain NCSA PAM POP3 RADIUS fake getpwnam NIS' '--enable-auth-digest=file' '--enable-external-acl-helpers=file_userip time_quota unix_group' '--enable-auth-negotiate=kerberos wrapper' '--enable-auth-ntlm=fake smb_lm' '--enable-storeio=ufs aufs diskd' '--enable-disk-io=AIO Blocking IpcIo Mmapped DiskThreads DiskDaemon' '--enable-log-daemon-helpers=file' '--enable-url-rewrite-helpers=fake' '--enable-storeid-rewrite-helpers=file' '--prefix=/usr/local' '--mandir=/usr/local/man' '--infodir=/usr/local/info/' '--build=amd64-portbld-freebsd10.1' 'build_alias=amd64-portbld-freebsd10.1' 'CC=cc' 'CFLAGS=-O2 -pipe -fstack-protector -fno-strict-aliasing' 'LDFLAGS= -pthread -fstack-protector' 'LIBS=' 'CPPFLAGS=' 'CXX=c++' 'CXXFLAGS=-O2 -pipe -fstack-protector -fno-strict-aliasing -Wno-unused-private-field' 'CPP=cpp' --enable-ltdl-convenience
Код: Выделить всё
visible_hostname srv.octi.org
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
#acl localnet src # RFC 4193 local private network range
#acl localnet src # RFC 4291 link-local (directly plugged) machines
acl SSL_ports port 443
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
#
# Recommended minimum Access Permission configuration:
#
# Deny requests to certain unsafe ports
http_access deny !Safe_ports
# Deny CONNECT to other than secure SSL ports
http_access deny CONNECT !SSL_ports
# Only allow cachemgr access from localhost
http_access allow localhost manager
http_access deny manager
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#
# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet
http_access allow localhost
# And finally deny all other access to this proxy
http_access deny all
# Squid normally listens to port 3128
http_port 3128
# http_port 127.0.0.1:3129 intercept
# Uncomment and adjust the following to add a disk cache directory.
cache_dir ufs /var/squid_cache 100 16 256
# Leave coredumps in the first cache dir
# coredump_dir /var/squid/cache
#
# Add any of your own refresh_pattern entries above these.
#
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern . 0 20% 4320
Код: Выделить всё
ext_ingeo_if = "em0" # Игнео
ext_if = "bge0" # Интернет
int_if = "bge1" # Локалка
localnet = "10.239.14.0/24" # задаём всю локальную сеть
set skip on lo0 # пропускаем все на локальной петле
set loginterface $ext_if # указываем интерфейс с которого снимаем логи
set block-policy return #политика блокировния
scrub in all # вычищаем все фрагментированные пакеты
rdr on $int_if inet proto tcp from $localnet to any port 80 -> 127.0.0.1 port 3129
nat on $ext_if from $int_if:network to any -> ($ext_if) # нат в интернет
nat on $ext_ingeo_if from $int_if:network to any -> ($ext_ingeo_if) # нат в ингео
pass in quick inet proto icmp all icmp-type echoreq # разрешить пинг
pass out quick inet proto icmp all icmp-type echoreq # разрешить пинг
pass in quick on $ext_if proto tcp to port 22 # разрешить ssh из интернета
pass in quick on $ext_if proto tcp to port 1723 # разрешить VPN из интернета
pass in quick on $ext_if proto udp to port 1723 # разрешить VPN из интернета
pass on $ext_if all
#block in on $ext_if all # блокируем весь входящий трафик на внешнем интерфейсе
# разрешения из внутренней сети в инет
#pass out quick on $ext_if proto tcp to port 20
#pass out quick on $ext_if proto tcp to port 21
#pass out quick on $ext_if proto tcp to port 22
#pass out quick on $ext_if proto tcp to port 25
#pass out quick on $ext_if proto tcp to port 53
#pass out quick on $ext_if proto tcp to port 80
#pass out quick on $ext_if proto tcp to port 443
#block out on $ext_if
pass on $int_if all # пропускаем все внутри сети

так же прошу помощи по нормальной настройки PF ... так как совсем недавно перешел с IPFW ...
Отправлено спустя 13 минут 56 секунд:
Интересует что это за ошибка?
FATAL: Received Segment Violation...dying.
и как с ней бороться