Не работает связка SQUID+SAMS Rejik3 NTLM

Проблемы с установкой, настройкой и работой системных и сетевых программ.

Модераторы: GRooVE, alexco

Правила форума
Убедительная просьба юзать теги [code] при оформлении листингов.
Сообщения не оформленные должным образом имеют все шансы быть незамеченными.
Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Не работает связка SQUID+SAMS Rejik3 NTLM

Непрочитанное сообщение Sindikat88 » 2010-11-01 11:25:06

Добрый день.
На днях поднимал сервер по этой инструкции http://www.lissyara.su/articles/freebsd ... rejik-ntlm. Весь процесс прошел без единой ошибки. Но после добавления пользователя в web интерфейс, он не может выйти в сеть, хотя Win7 показывает, что доступ к Интернету есть.
Доступ к интернету с самой Фришки есть, пинг идет. А вот с клиентской машины пинги не идут.
Немного о себе:

Код: Выделить всё

Gateway# uname -a
FreeBSD Gateway.ac-construction.local 8.1-RELEASE FreeBSD 8.1-RELEASE #0: Mon Jul 19 02:36:49 UTC 2010     root@mason.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  amd64
Gateway# pkg_info | grep apache
apache-1.3.42       The extremely popular Apache http server. Very fast, very c
Gateway# pkg_info |grep squid
rejik-3.2.6         A squid redirector used for blocking unwanted content
squid-2.7.9         HTTP Caching Proxy
Gateway# pkg_info | grep sams
sams-1.0.5_4,1      Squid 2.x Accounting Management System
192.168.1.1 - контроллер домена, он же DNS и DHCP
192.168.1.2 - резервный контроллер домена, второй DNS
192.168.1.209 - внутренний интерфейс машины в FreeBSD

Вот что пишут логи:
/var/log/httpd-error.log

Код: Выделить всё

[Sat Oct 30 10:39:33 2010] [notice] Apache/1.3.42 (Unix) PHP/5.3.3 with Suhosin-Patch configured -- resuming normal operations
[Sat Oct 30 10:39:34 2010] [notice] Accept mutex: flock (Default: flock)
[Sat Oct 30 10:40:40 2010] [error] [client 192.168.1.25] File does not exist: /usr/local/www/data/fwlink/
[Sat Oct 30 10:45:16 2010] [error] [client 192.168.1.25] File does not exist: /usr/local/www/data/fwlink/
[Sat Oct 30 10:45:20 2010] [error] [client 192.168.1.25] File does not exist: /usr/local/www/data/update/AU/map-2.0.2.1.xml
[Sat Oct 30 10:45:24 2010] [error] [client 192.168.1.25] File does not exist: /usr/local/www/data/javafx-cache.jnlp
[Sat Oct 30 10:45:24 2010] [error] [client 192.168.1.25] File does not exist: /usr/local/www/data/javafx-cache.jnlp
[Sat Oct 30 10:45:24 2010] [error] [client 192.168.1.25] File does not exist: /usr/local/www/data/javafx-cache.jnlp
[Sat Oct 30 11:01:25 2010] [notice] caught SIGTERM, shutting down
[Sat Oct 30 11:03:19 2010] [notice] Apache/1.3.42 (Unix) PHP/5.3.3 with Suhosin-Patch configured -- resuming normal operations
[Sat Oct 30 11:03:20 2010] [notice] Accept mutex: flock (Default: flock)
[Sat Oct 30 11:17:03 2010] [notice] caught SIGTERM, shutting down
[Sat Oct 30 11:19:03 2010] [notice] Apache/1.3.42 (Unix) PHP/5.3.3 with Suhosin-Patch configured -- resuming normal operations
[Sat Oct 30 11:19:04 2010] [notice] Accept mutex: flock (Default: flock)
[Sat Oct 30 11:23:20 2010] [notice] caught SIGTERM, shutting down
[Sat Oct 30 11:25:16 2010] [notice] Apache/1.3.42 (Unix) PHP/5.3.3 with Suhosin-Patch configured -- resuming normal operations
[Sat Oct 30 11:25:17 2010] [notice] Accept mutex: flock (Default: flock)
/var/log/http-access.log

Код: Выделить всё

192.168.1.25 - - [30/Oct/2010:10:40:40 +0400] "GET http://go.microsoft.com/fwlink/?LinkId=69157 HTTP/1.1" 404 299 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:41 +0400] "GET http://www.bing.com/favicon.ico HTTP/1.1" 200 662 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/ HTTP/1.1" 304 - "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/main.php?show=exe&function=userdoc HTTP/1.1" 200 884 "http://192.168.1.209/sams/" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/tray.php?show=exe&function=admintray HTTP/1.1" 200 931 "http://192.168.1.209/sams/" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/lframe.php HTTP/1.1" 200 37329 "http://192.168.1.209/sams/" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/icon/classic/tree.css HTTP/1.1" 304 - "http://192.168.1.209/sams/main.php?show=exe&function=userdoc" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/icon/classic/user.jpg HTTP/1.1" 304 - "http://192.168.1.209/sams/main.php?show=exe&function=userdoc" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/icon/classic/lframe.jpg HTTP/1.1" 304 - "http://192.168.1.209/sams/main.php?show=exe&function=userdoc" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:48 +0400] "GET http://192.168.1.209/sams/icon/classic/sams.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/usergroup_32.jpg HTTP/1.1" 304 - "http://192.168.1.209/sams/tray.php?show=exe&function=admintray" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2vertline.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2mlastnode.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2mnode.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2plastnode.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2pnode.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2blank.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2lastnode.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/ftv2doc.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)"
192.168.1.25 - - [30/Oct/2010:10:40:49 +0400] "GET http://192.168.1.209/sams/icon/classic/earth.gif HTTP/1.1" 304 - "http://192.168.1.209/sams/lframe.php" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.2; .NET4.0C)" 

Пропущено...

192.168.1.25 - - [30/Oct/2010:11:16:41 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:11:16:41 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:11:16:41 +0400] "CONNECT urs.microsoft.com:443 HTTP/1.0" 200 22 "-" "VCSoapClient"
192.168.1.25 - - [30/Oct/2010:11:16:50 +0400] "GET http://dnl-16.geo.kaspersky.com/index/u0607g.xml.dif HTTP/1.0" 200 22 "-" "tD4xBxiBl-o-xEkwhGtBARNi4wLjQuMTIxMg=="
192.168.1.25 - - [30/Oct/2010:11:16:50 +0400] "GET http://dnl-16.geo.kaspersky.com/index/u0607g.xml.klz HTTP/1.0" 200 22 "-" "tD4xBxiBl-o-xEkwhGtBARNi4wLjQuMTIxMg=="
192.168.1.25 - - [30/Oct/2010:11:16:50 +0400] "GET http://dnl-16.geo.kaspersky.com/index/u0607g.xml HTTP/1.0" 200 22 "-" "tD4xBxiBl-o-xEkwhGtBARNi4wLjQuMTIxMg=="
192.168.1.25 - - [30/Oct/2010:11:17:02 +0400] "GET http://dnl-11.geo.kaspersky.com/index/u0607g.xml.dif HTTP/1.0" 200 22 "-" "tD4xBxiBl-o-xEkwhGtBARNi4wLjQuMTIxMg=="
192.168.1.25 - - [30/Oct/2010:11:17:02 +0400] "GET http://dnl-11.geo.kaspersky.com/index/u0607g.xml.klz HTTP/1.0" 200 22 "-" "tD4xBxiBl-o-xEkwhGtBARNi4wLjQuMTIxMg=="
192.168.1.25 - - [30/Oct/2010:11:17:02 +0400] "GET http://dnl-11.geo.kaspersky.com/index/u0607g.xml HTTP/1.0" 200 22 "-" "tD4xBxiBl-o-xEkwhGtBARNi4wLjQuMTIxMg==" 
Привожу свои конфиги:
/etc/hosts

Код: Выделить всё

::1			localhost localhost.ac-construction.local
127.0.0.1		localhost localhost.ac-construction.local
# Первая сетевая смотрящая в локалку
192.168.1.209		Gateway.ac-construction.local Gateway
192.168.1.209		Gateway.ac-construction.local
# Вторая сетевая смотрящая наружу
217.170.220.83          Gateway.ac-construction.local
#Контроллер домена он же  DNS и DHCP
192.168.1.1           servern.ac-construction.local     servern
192.168.1.1     ac-construction.local 
/etc/resolv.conf

Код: Выделить всё

search  ac-construction.local
#DNS сервер для первой сетевой карты
nameserver      192.168.1.2
nameserver      192.168.1.1
# DNS провайдера для второй сетевой карты смотрящей наружу
nameserver      217.170.209.2
nameserver      217.170.210.2
/usr/local/etc/sams.conf

Код: Выделить всё

[client]
SQUID_DB=squidlog
SAMS_DB=squidctrl
MYSQLHOSTNAME=localhost
MYSQLUSER=sams
MYSQLPASSWORD=*****
MYSQLVERSION=5.1
SQUIDCACHEFILE=access.log
SQUIDROOTDIR=/usr/local/etc/squid
SQUIDLOGDIR=/usr/local/squid/logs
SQUIDCACHEDIR=/usr/local/squid/cache
SAMSPATH=/usr/local
SQUIDPATH=/usr/local/sbin
#SQUIDGUARDLOGPATH=/var/log
#SQUIDGUARDDBPATH=/var/db/squidguard
RECODECOMMAND=iconv -f KOI8-R -t 866 %finp > %fout
LDAPSERVER=192.168.1.1
LDAPBASEDN=AC-CONSTRUCTION.LOCAL
LDAPUSER=Administrator
LDAPUSERPASSWD=*****
LDAPUSERSGROUP=dep
REJIKPATH=/usr/local/rejik
SHUTDOWNCOMMAND=shutdown -h now
CACHENUM=0

Хостинговая компания Host-Food.ru
Хостинг HostFood.ru
 

Услуги хостинговой компании Host-Food.ru

Хостинг HostFood.ru

Тарифы на хостинг в России, от 12 рублей: https://www.host-food.ru/tariffs/hosting/
Тарифы на виртуальные сервера (VPS/VDS/KVM) в РФ, от 189 руб.: https://www.host-food.ru/tariffs/virtualny-server-vps/
Выделенные сервера, Россия, Москва, от 2000 рублей (HP Proliant G5, Intel Xeon E5430 (2.66GHz, Quad-Core, 12Mb), 8Gb RAM, 2x300Gb SAS HDD, P400i, 512Mb, BBU):
https://www.host-food.ru/tariffs/vydelennyi-server-ds/
Недорогие домены в популярных зонах: https://www.host-food.ru/domains/

Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Re: Не работает связка SQUID+SAMS Rejik3 NTLM

Непрочитанное сообщение Sindikat88 » 2010-11-01 11:29:43

Привожу конфиг Сквида
/usr/local/etc/squid/squid.conf

Код: Выделить всё

# created by SAMS _sams_ 2010-10-30 11:15:53

#	WELCOME TO SQUID 2.7.STABLE9
#	----------------------------
#
#	This is the default Squid configuration file. You may wish
#	to look at the Squid home page (http://www.squid-cache.org/)
#	for the FAQ and other documentation.
#
#	The default Squid config file shows what the defaults for
#	various options happen to be.  If you don't need to change the
#	default, you shouldn't uncomment the line.  Doing so may cause
#	run-time problems.  In some cases "none" refers to no default
#	setting at all, while in other cases it refers to a valid
#	option - the comments for that keyword indicate if this is the
#	case.
#


#  Configuration options can be included using the "include" directive.
#  Include takes a list of files to include. Quoting and wildcards is
#  supported.
#
#  For example,
#
#  include /path/to/included/file/squid.acl.config
#
#  Includes can be nested up to a hard-coded depth of 16 levels.
#  This arbitrary restriction is to prevent recursive include references
#  from causing Squid entering an infinite loop whilst trying to load
#  configuration files.


# OPTIONS FOR AUTHENTICATION
# -----------------------------------------------------------------------------

#  TAG: auth_param
#	This is used to define parameters for the various authentication
#	schemes supported by Squid.
#
#	format: auth_param scheme parameter [setting]
#
#	The order in which authentication schemes are presented to the client is
#	dependent on the order the scheme first appears in config file. IE
#	has a bug (it's not RFC 2617 compliant) in that it will use the basic
#	scheme if basic is the first entry presented, even if more secure
#	schemes are presented. For now use the order in the recommended
#	settings section below. If other browsers have difficulties (don't
#	recognize the schemes offered even if you are using basic) either
#	put basic first, or disable the other schemes (by commenting out their
#	program entry).
#
#	Once an authentication scheme is fully configured, it can only be
#	shutdown by shutting squid down and restarting. Changes can be made on
#	the fly and activated with a reconfigure. I.E. You can change to a
#	different helper, but not unconfigure the helper completely.
#
#	Please note that while this directive defines how Squid processes
#	authentication it does not automatically activate authentication.
#	To use authentication you must in addition make use of ACLs based
#	on login name in http_access (proxy_auth, proxy_auth_regex or
#	external with %LOGIN used in the format tag). The browser will be
#	challenged for authentication on the first such acl encountered
#	in http_access processing and will also be re-challenged for new
#	login credentials if the request is being denied by a proxy_auth
#	type acl.
#
#	WARNING: authentication can't be used in a transparently intercepting
#	proxy as the client then thinks it is talking to an origin server and
#	not the proxy. This is a limitation of bending the TCP/IP protocol to
#	transparently intercepting port 80, not a limitation in Squid.
#
#	=== Parameters for the basic scheme follow. ===
#
#	"program" cmdline
#	Specify the command for the external authenticator.  Such a program
#	reads a line containing "username password" and replies "OK" or
#	"ERR" in an endless loop. "ERR" responses may optionally be followed
#	by a error description available as %m in the returned error page.
#
#	By default, the basic authentication scheme is not used unless a
#	program is specified.
#
#	If you want to use the traditional proxy authentication, jump over to
#	the helpers/basic_auth/NCSA directory and type:
#		% make
#		% make install
#
#	Then, set this line to something like
#
#	auth_param basic program /usr/local/libexec/ncsa_auth /usr/local/etc/passwd
#
#	"children" numberofchildren
#	The number of authenticator processes to spawn. If you start too few
#	squid will have to wait for them to process a backlog of credential
#	verifications, slowing it down. When credential verifications are
#	done via a (slow) network you are likely to need lots of
#	authenticator processes.
#	auth_param basic children 5
#
#	"concurrency" numberofconcurrentrequests
#	The number of concurrent requests/channels the helper supports.
#	Changes the protocol used to include a channel number first on
#	the request/response line, allowing multiple requests to be sent
#	to the same helper in parallell without wating for the response.
#	Must not be set unless it's known the helper supports this.
#
#	"realm" realmstring
#	Specifies the realm name which is to be reported to the client for
#	the basic proxy authentication scheme (part of the text the user
#	will see when prompted their username and password).
#	auth_param basic realm Squid proxy-caching web server
#
#	"credentialsttl" timetolive
#	Specifies how long squid assumes an externally validated
#	username:password pair is valid for - in other words how often the
#	helper program is called for that user. Set this low to force
#	revalidation with short lived passwords.  Note that setting this high
#	does not impact your susceptibility to replay attacks unless you are
#	using an one-time password system (such as SecureID). If you are using
#	such a system, you will be vulnerable to replay attacks unless you
#	also use the max_user_ip ACL in an http_access rule.
#	auth_param basic credentialsttl 2 hours
#
#	"casesensitive" on|off
#	Specifies if usernames are case sensitive. Most user databases are
#	case insensitive allowing the same username to be spelled using both
#	lower and upper case letters, but some are case sensitive. This
#	makes a big difference for user_max_ip ACL processing and similar.
#	auth_param basic casesensitive off
#
#	"blankpassword" on|off
#	Specifies if blank passwords should be supported. Defaults to off
#	as there is multiple authentication backends which handles blank
#	passwords as "guest" access.
#
#	=== Parameters for the digest scheme follow ===
#
#	"program" cmdline
#	Specify the command for the external authenticator.  Such a program
#	reads a line containing "username":"realm" and replies with the
#	appropriate H(A1) value hex encoded or ERR if the user (or his H(A1)
#	hash) does not exists.  See RFC 2616 for the definition of H(A1).
#	"ERR" responses may optionally be followed by a error description
#	available as %m in the returned error page.
#
#	By default, the digest authentication scheme is not used unless a
#	program is specified.
#
#	If you want to use a digest authenticator, jump over to the
#	helpers/digest_auth/ directory and choose the authenticator to use.
#	It it's directory type
#		% make
#		% make install
#
#	Then, set this line to something like
#
#	auth_param digest program /usr/local/libexec/digest_auth_pw /usr/local/etc/digpass
#
#	"children" numberofchildren
#	The number of authenticator processes to spawn. If you start too few
#	squid will have to wait for them to process a backlog of credential
#	verifications, slowing it down. When credential verifications are
#	done via a (slow) network you are likely to need lots of
#	authenticator processes.
#	auth_param digest children 5
#
#	"concurrency" numberofconcurrentrequests
#	The number of concurrent requests/channels the helper supports.
#	Changes the protocol used to include a channel number first on
#	the request/response line, allowing multiple requests to be sent
#	to the same helper in parallell without wating for the response.
#	Must not be set unless it's known the helper supports this.
#
#	"realm" realmstring
#	Specifies the realm name which is to be reported to the client for the
#	digest proxy authentication scheme (part of the text the user will see
#	when prompted their username and password).
#	auth_param digest realm Squid proxy-caching web server
#
#	"nonce_garbage_interval" timeinterval
#	Specifies the interval that nonces that have been issued to clients are
#	checked for validity.
#	auth_param digest nonce_garbage_interval 5 minutes
#
#	"nonce_max_duration" timeinterval
#	Specifies the maximum length of time a given nonce will be valid for.
#	auth_param digest nonce_max_duration 30 minutes
#
#	"nonce_max_count" number
#	Specifies the maximum number of times a given nonce can be used.
#	auth_param digest nonce_max_count 50
#
#	"nonce_strictness" on|off
#	Determines if squid requires strict increment-by-1 behavior for nonce
#	counts, or just incrementing (off - for use when useragents generate
#	nonce counts that occasionally miss 1 (ie, 1,2,4,6)).
#	auth_param digest nonce_strictness off
#
#	"check_nonce_count" on|off
#	This directive if set to off can disable the nonce count check
#	completely to work around buggy digest qop implementations in certain
#	mainstream browser versions. Default on to check the nonce count to
#	protect from authentication replay attacks.
#	auth_param digest check_nonce_count on
#
#	"post_workaround" on|off
#	This is a workaround to certain buggy browsers who sends an incorrect
#	request digest in POST requests when reusing the same nonce as acquired
#	earlier in response to a GET request.
#	auth_param digest post_workaround off
#
#	=== NTLM scheme options follow ===
#
#	"program" cmdline
#	Specify the command for the external NTLM authenticator. Such a
#	program participates in the NTLMSSP exchanges between Squid and the
#	client and reads commands according to the Squid NTLMSSP helper
#	protocol. See helpers/ntlm_auth/ for details. Recommended ntlm
#	authenticator is ntlm_auth from Samba-3.X, but a number of other
#	ntlm authenticators is available.
#
#	By default, the ntlm authentication scheme is not used unless a
#	program is specified.
#
#	auth_param ntlm program /path/to/samba/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp
#
#	"children" numberofchildren
#	The number of authenticator processes to spawn. If you start too few
#	squid will have to wait for them to process a backlog of credential
#	verifications, slowing it down. When credential verifications are
#	done via a (slow) network you are likely to need lots of
#	authenticator processes.
#	auth_param ntlm children 5
#
#	"keep_alive" on|off
#	This option enables the use of keep-alive on the initial
#	authentication request. It has been reported some versions of MSIE
#	have problems if this is enabled, but performance will be increased
#	if enabled.
#
#	auth_param ntlm keep_alive on
#
#	=== Negotiate scheme options follow ===
#
#	"program" cmdline
#	Specify the command for the external Negotiate authenticator. Such a
#	program participates in the SPNEGO exchanges between Squid and the
#	client and reads commands according to the Squid ntlmssp helper
#	protocol. See helpers/ntlm_auth/ for details. Recommended SPNEGO
#	authenticator is ntlm_auth from Samba-4.X.
#
#	By default, the Negotiate authentication scheme is not used unless a
#	program is specified.
#
#	auth_param negotiate program /path/to/samba/bin/ntlm_auth --helper-protocol=gss-spnego
#
#	"children" numberofchildren
#	The number of authenticator processes to spawn. If you start too few
#	squid will have to wait for them to process a backlog of credential
#	verifications, slowing it down. When credential verifications are
#	done via a (slow) network you are likely to need lots of
#	authenticator processes.
#	auth_param negotiate children 5
#
#	"keep_alive" on|off
#	If you experience problems with PUT/POST requests when using the
#	Negotiate authentication scheme then you can try setting this to
#	off. This will cause Squid to forcibly close the connection on
#	the initial requests where the browser asks which schemes are
#	supported by the proxy.
#
#	auth_param negotiate keep_alive on
#
#Recommended minimum configuration per scheme:
auth_param ntlm program /usr/local/bin/ntlm_auth --helper-protocol=squid-2.5-ntlmssp
auth_param ntlm children 5
auth_param ntlm keep_alive on
auth_param basic program /usr/local/bin/ntlm_auth --helper-protocol=squid-2.5-basic
auth_param basic children 5
auth_param basic realm Squid Proxy-Server
auth_param basic credentialsttl 2 hours
auth_param basic casesensitive off

#  TAG: authenticate_cache_garbage_interval
#	The time period between garbage collection across the username cache.
#	This is a tradeoff between memory utilization (long intervals - say
#	2 days) and CPU (short intervals - say 1 minute). Only change if you
#	have good reason to.
#
#Default:
# authenticate_cache_garbage_interval 1 hour

#  TAG: authenticate_ttl
#	The time a user & their credentials stay in the logged in user cache
#	since their last request. When the garbage interval passes, all user
#	credentials that have passed their TTL are removed from memory.
#
#Default:
# authenticate_ttl 1 hour

#  TAG: authenticate_ip_ttl
#	If you use proxy authentication and the 'max_user_ip' ACL, this
#	directive controls how long Squid remembers the IP addresses
#	associated with each user.  Use a small value (e.g., 60 seconds) if
#	your users might change addresses quickly, as is the case with
#	dialups. You might be safe using a larger value (e.g., 2 hours) in a
#	corporate LAN environment with relatively static address assignments.
#
#Default:
# authenticate_ip_ttl 0 seconds

#  TAG: authenticate_ip_shortcircuit_ttl
#	Cache authentication credentials per client IP address for this
#	long. Default is 0 seconds (disabled).
#
#	See also authenticate_ip_shortcircuit_access directive.
#
#Default:
# authenticate_ip_shortcircuit_ttl 0 seconds


# ACCESS CONTROLS
# -----------------------------------------------------------------------------

#  TAG: external_acl_type
#	This option defines external acl classes using a helper program to
#	look up the status
#
#	  external_acl_type name [options] FORMAT.. /path/to/helper [helper arguments..]
#
#	Options:
#
#	  ttl=n		TTL in seconds for cached results (defaults to 3600
#			for 1 hour)
#	  negative_ttl=n
#			TTL for cached negative lookups (default same
#			as ttl)
#	  children=n	number of processes spawn to service external acl
#			lookups of this type. (default 5).
#	  concurrency=n	concurrency level per process. Only used with helpers
#	  		capable of processing more than one query at a time.
#			Note: see compatibility note below
#	  cache=n	result cache size, 0 is unbounded (default)
#	  grace=	Percentage remaining of TTL where a refresh of a
#			cached entry should be initiated without needing to
#			wait for a new reply. (default 0 for no grace period)
#	  protocol=2.5  Compatibility mode for Squid-2.5 external acl helpers
#
#	FORMAT specifications
#
#	  %LOGIN	Authenticated user login name
#	  %EXT_USER	Username from external acl
#	  %IDENT	Ident user name
#	  %SRC		Client IP
#	  %SRCPORT	Client source port
#	  %URI		Requested URI
#	  %DST		Requested host
#	  %PROTO	Requested protocol
#	  %PORT		Requested port
#	  %METHOD	Request method
#	  %MYADDR	Squid interface address
#	  %MYPORT	Squid http_port number
#	  %PATH		Requested URL-path (including query-string if any)
#	  %USER_CERT	SSL User certificate in PEM format
#	  %USER_CERTCHAIN SSL User certificate chain in PEM format
#	  %USER_CERT_xx	SSL User certificate subject attribute xx
#	  %USER_CA_xx	SSL User certificate issuer attribute xx
#	  %{Header}	HTTP request header "Header"
#	  %{Hdr:member}	HTTP request header "Hdr" list member "member"
#	  %{Hdr:;member}
#			HTTP request header list member using ; as
#			list separator. ; can be any non-alphanumeric
#			character.
#	 %ACL		The ACL name
#	 %DATA		The ACL arguments. If not used then any arguments
#			is automatically added at the end
#
#	In addition to the above, any string specified in the referencing
#	acl will also be included in the helper request line, after the
#	specified formats (see the "acl external" directive)
#
#	The helper receives lines per the above format specification,
#	and returns lines starting with OK or ERR indicating the validity
#	of the request and optionally followed by additional keywords with
#	more details.
#
#	General result syntax:
#
#	  OK/ERR keyword=value ...
#
#	Defined keywords:
#
#	  user=		The users name (login also understood)
#	  password=	The users password (for PROXYPASS login= cache_peer)
#	  message=	Error message or similar used as %o in error messages
#			(error also understood)
#	  log=		String to be logged in access.log. Available as
#			%ea in logformat specifications
#
#	If protocol=3.0 (the default) then URL escaping is used to protect
#	each value in both requests and responses.
#
#	If using protocol=2.5 then all values need to be enclosed in quotes
#	if they may contain whitespace, or the whitespace escaped using \.
#	And quotes or \ characters within the keyword value must be \ escaped.
#
#	When using the concurrency= option the protocol is changed by
#	introducing a query channel tag infront of the request/response.
#	The query channel tag is a number between 0 and concurrency-1.
#
#	Compatibility Note: The children= option was named concurrency= in
#	Squid-2.5.STABLE3 and earlier, and was accepted as an alias for the
#	duration of the Squid-2.5 releases to keep compatibility. However,
#	the meaning of concurrency= option has changed in Squid-2.6 to match
#	that of Squid-3 and the old syntax no longer works.
#
#Default:
# none

#  TAG: acl
acl _sams_default proxy_auth "/usr/local/etc/squid/default.sams" 
acl _sams_default_time time MTWHFAS 00:00-23:00
#	Defining an Access List
#
#    Every access list definition must begin with an aclname and acltype, 
#    followed by either type-specific arguments or a quoted filename that
#    they are read from.
#
#	acl aclname acltype argument ...
#	acl aclname acltype "file" ...
#
#	when using "file", the file should contain one item per line.
#
#	By default, regular expressions are CASE-SENSITIVE.  To make
#	them case-insensitive, use the -i option.
#
#	acl aclname src      ip-address/netmask ... (clients IP address)
#	acl aclname src      addr1-addr2/netmask ... (range of addresses)
#	acl aclname dst      ip-address/netmask ... (URL host's IP address)
#	acl aclname myip     ip-address/netmask ... (local socket IP address)
#
#	acl aclname arp      mac-address ... (xx:xx:xx:xx:xx:xx notation)
#	  # The arp ACL requires the special configure option --enable-arp-acl.
#	  # Furthermore, the arp ACL code is not portable to all operating systems.
#	  # It works on Linux, Solaris, FreeBSD and some other *BSD variants.
#	  #
#	  # NOTE: Squid can only determine the MAC address for clients that are on
#	  # the same subnet. If the client is on a different subnet, then Squid cannot
#	  # find out its MAC address.
#
#	acl aclname srcdomain   .foo.com ...    # reverse lookup, client IP
#	acl aclname dstdomain   .foo.com ...    # Destination server from URL
#	acl aclname srcdom_regex [-i] xxx ...   # regex matching client name
#	acl aclname dstdom_regex [-i] xxx ...   # regex matching server
#	  # For dstdomain and dstdom_regex a reverse lookup is tried if a IP
#	  # based URL is used and no match is found. The name "none" is used
#	  # if the reverse lookup fails.
#
#	acl aclname time     [day-abbrevs]  [h1:m1-h2:m2]
#	    # day-abbrevs:
#		# S - Sunday
#		# M - Monday
#		# T - Tuesday
#		# W - Wednesday
#		# H - Thursday
#		# F - Friday
#		# A - Saturday
#	    # h1:m1 must be less than h2:m2
#	acl aclname url_regex [-i] ^http:// ...	    # regex matching on whole URL
#	acl aclname urlpath_regex [-i] \.gif$ ...	# regex matching on URL path
#	acl aclname urllogin [-i] [^a-zA-Z0-9] ...	# regex matching on URL login field
#	acl aclname port     80 70 21 ...
#	acl aclname port     0-1024 ...		# ranges allowed
#	acl aclname myport   3128 ...		# (local socket TCP port)
#	acl aclname myportname 3128 ...		# http(s)_port name
#	acl aclname proto    HTTP FTP ...
#	acl aclname method   GET POST ...
#	acl aclname browser  [-i] regexp ...
#	  # pattern match on User-Agent header (see also req_header below)
#	acl aclname referer_regex  [-i] regexp ...
#	  # pattern match on Referer header
#	  # Referer is highly unreliable, so use with care
#	acl aclname ident    username ...
#	acl aclname ident_regex [-i] pattern ...
#	  # string match on ident output.
#	  # use REQUIRED to accept any non-null ident.
#	acl aclname src_as   number ...
#	acl aclname dst_as   number ...
#	  # Except for access control, AS numbers can be used for
#	  # routing of requests to specific caches. Here's an
#	  # example for routing all requests for AS#1241 and only
#	  # those to mycache.mydomain.net:
#	  # acl asexample dst_as 1241
#	  # cache_peer_access mycache.mydomain.net allow asexample
#	  # cache_peer_access mycache_mydomain.net deny all
#
#	acl aclname proxy_auth [-i] username ...
#	acl aclname proxy_auth_regex [-i] pattern ...
#	  # list of valid usernames
#	  # use REQUIRED to accept any valid username.
#	  #
#	  # NOTE: when a Proxy-Authentication header is sent but it is not
#	  # needed during ACL checking the username is NOT logged
#	  # in access.log.
#	  #
#	  # NOTE: proxy_auth requires a EXTERNAL authentication program
#	  # to check username/password combinations (see
#	  # auth_param directive).
#	  #
#	  # NOTE: proxy_auth can't be used in a transparent proxy as
#	  # the browser needs to be configured for using a proxy in order
#	  # to respond to proxy authentication.
#
#	acl aclname snmp_community string ...
#	  # A community string to limit access to your SNMP Agent
#	  # Example:
#	  #
#	  #	acl snmppublic snmp_community public
#
#	acl aclname maxconn number
#	  # This will be matched when the client's IP address has
#	  # more than <number> HTTP connections established.
#
#	acl aclname max_user_ip [-s] number
#	  # This will be matched when the user attempts to log in from more
#	  # than <number> different ip addresses. The authenticate_ip_ttl
#	  # parameter controls the timeout on the ip entries.
#	  # If -s is specified the limit is strict, denying browsing
#	  # from any further IP addresses until the ttl has expired. Without
#	  # -s Squid will just annoy the user by "randomly" denying requests.
#	  # (the counter is reset each time the limit is reached and a
#	  # request is denied)
#	  # NOTE: in acceleration mode or where there is mesh of child proxies,
#	  # clients may appear to come from multiple addresses if they are
#	  # going through proxy farms, so a limit of 1 may cause user problems.
#
#	acl aclname req_mime_type mime-type ...
#	  # regex match against the mime type of the request generated
#	  # by the client. Can be used to detect file upload or some
#	  # types HTTP tunneling requests.
#	  # NOTE: This does NOT match the reply. You cannot use this
#	  # to match the returned file type.
#
#	acl aclname req_header header-name [-i] any\.regex\.here
#	  # regex match against any of the known request headers.  May be
#	  # thought of as a superset of "browser", "referer" and "mime-type"
#	  # ACLs.
#
#	acl aclname rep_mime_type mime-type ...
#	  # regex match against the mime type of the reply received by
#	  # squid. Can be used to detect file download or some
#	  # types HTTP tunneling requests.
#	  # NOTE: This has no effect in http_access rules. It only has
#	  # effect in rules that affect the reply data stream such as
#	  # http_reply_access.
#
#	acl aclname rep_header header-name [-i] any\.regex\.here
#	  # regex match against any of the known reply headers. May be
#	  # thought of as a superset of "browser", "referer" and "mime-type"
#	  # ACLs.
#	  #
#	  # Example:
#	  #
#	  # acl many_spaces rep_header Content-Disposition -i [[:space:]]{3,}
#
#	acl aclname external class_name [arguments...]
#	  # external ACL lookup via a helper class defined by the
#	  # external_acl_type directive.
#
#	acl aclname urlgroup group1 ...
#	  # match against the urlgroup as indicated by redirectors
#
#	acl aclname user_cert attribute values...
#	  # match against attributes in a user SSL certificate
#	  # attribute is one of DN/C/O/CN/L/ST
#
#	acl aclname ca_cert attribute values...
#	  # match against attributes a users issuing CA SSL certificate
#	  # attribute is one of DN/C/O/CN/L/ST
#
#	acl aclname ext_user username ...
#	acl aclname ext_user_regex [-i] pattern ...
#	  # string match on username returned by external acl helper
#	  # use REQUIRED to accept any non-null user name.
#
#Examples:
#acl macaddress arp 09:00:2b:23:45:67
#acl myexample dst_as 1241
#acl password proxy_auth REQUIRED
#acl fileupload req_mime_type -i ^multipart/form-data$
#acl javascript rep_mime_type -i ^application/x-javascript$
#
#Recommended minimum configuration:
acl all src all
acl manager proto cache_object
acl localhost src 127.0.0.1/32
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32
#
# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8	# RFC1918 possible internal network
acl localnet src 172.16.0.0/12	# RFC1918 possible internal network
acl localnet src 192.168.0.0/16	# RFC1918 possible internal network
#
acl SSL_ports port 443
acl Safe_ports port 80		# http
acl Safe_ports port 21		# ftp
acl Safe_ports port 443		# https
acl Safe_ports port 70		# gopher
acl Safe_ports port 210		# wais
acl Safe_ports port 1025-65535	# unregistered ports
acl Safe_ports port 280		# http-mgmt
acl Safe_ports port 488		# gss-http
acl Safe_ports port 591		# filemaker
acl Safe_ports port 777		# multiling http
acl CONNECT method CONNECT

#  TAG: http_access
http_access allow _sams_default  _sams_default_time  
#	Allowing or Denying access based on defined access lists
#
#	Access to the HTTP port:
#	http_access allow|deny [!]aclname ...
#
#	NOTE on default values:
#
#	If there are no "access" lines present, the default is to deny
#	the request.
#
#	If none of the "access" lines cause a match, the default is the
#	opposite of the last line in the list.  If the last line was
#	deny, the default is allow.  Conversely, if the last line
#	is allow, the default will be deny.  For these reasons, it is a
#	good idea to have an "deny all" or "allow all" entry at the end
#	of your access lists to avoid potential confusion.
#
#Default:
 http_access deny all
#
#Recommended minimum configuration:
#
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager
# Deny requests to unknown ports
http_access deny !Safe_ports
# Deny CONNECT to other than SSL ports
http_access deny CONNECT !SSL_ports
#
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS

# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet

# And finally deny all other access to this proxy
http_access deny all

#  TAG: http_access2
#	Allowing or Denying access based on defined access lists
#
#	Identical to http_access, but runs after redirectors. If not set
#	then only http_access is used.
#
#Default:
# none

#  TAG: http_reply_access
#	Allow replies to client requests. This is complementary to http_access.
#
#	http_reply_access allow|deny [!] aclname ...
#
#	NOTE: if there are no access lines present, the default is to allow
#	all replies
#
#	If none of the access lines cause a match the opposite of the
#	last line will apply. Thus it is good practice to end the rules
#	with an "allow all" or "deny all" entry.
#
#Default:
# http_reply_access allow all

#  TAG: icp_access
#	Allowing or Denying access to the ICP port based on defined
#	access lists
#
#	icp_access  allow|deny [!]aclname ...
#
#	See http_access for details
#
#Default:
# icp_access deny all
#
#Allow ICP queries from local networks only
icp_access allow localnet
icp_access deny all

#  TAG: htcp_access
# Note: This option is only available if Squid is rebuilt with the
#       --enable-htcp option
#
#	Allowing or Denying access to the HTCP port based on defined
#	access lists
#
#	htcp_access  allow|deny [!]aclname ...
#
#	See http_access for details
#
#	NOTE: The default if no htcp_access lines are present is to
#	deny all traffic. This default may cause problems with peers
#	using the htcp or htcp-oldsquid options.
#
#Default:
# htcp_access deny all
#
#Allow HTCP queries from local networks only
# htcp_access allow localnet
# htcp_access deny all

#  TAG: htcp_clr_access
# Note: This option is only available if Squid is rebuilt with the
#       --enable-htcp option
#
#	Allowing or Denying access to purge content using HTCP based
#	on defined access lists
#
#	htcp_clr_access  allow|deny [!]aclname ...
#
#	See http_access for details
#
##Allow HTCP CLR requests from trusted peers
#acl htcp_clr_peer src 172.16.1.2
#htcp_clr_access allow htcp_clr_peer
#
#Default:
# htcp_clr_access deny all

#  TAG: miss_access
#	Use to force your neighbors to use you as a sibling instead of
#	a parent.  For example:
#
#		acl localclients src 172.16.0.0/16
#		miss_access allow localclients
#		miss_access deny  !localclients
#
#	This means only your local clients are allowed to fetch
#	MISSES and all other clients can only fetch HITS.
#
#	By default, allow all clients who passed the http_access rules
#	to fetch MISSES from us.
#
#Default setting:
# miss_access allow all

#  TAG: ident_lookup_access
#	A list of ACL elements which, if matched, cause an ident
#	(RFC931) lookup to be performed for this request.  For
#	example, you might choose to always perform ident lookups
#	for your main multi-user Unix boxes, but not for your Macs
#	and PCs.  By default, ident lookups are not performed for
#	any requests.
#
#	To enable ident lookups for specific client addresses, you
#	can follow this example:
#
#	acl ident_aware_hosts src 198.168.1.0/255.255.255.0
#	ident_lookup_access allow ident_aware_hosts
#	ident_lookup_access deny all
#
#	Only src type ACL checks are fully supported.  A src_domain
#	ACL might work at times, but it will not always provide
#	the correct result.
#
#Default:
# ident_lookup_access deny all

#  TAG: reply_body_max_size	bytes deny acl acl...
#	This option specifies the maximum size of a reply body in bytes.
#	It can be used to prevent users from downloading very large files,
#	such as MP3's and movies. When the reply headers are received,
#	the reply_body_max_size lines are processed, and the first line with
#	a result of "deny" is used as the maximum body size for this reply.
#	This size is checked twice. First when we get the reply headers,
#	we check the content-length value.  If the content length value exists
#	and is larger than the allowed size, the request is denied and the
#	user receives an error message that says "the request or reply
#	is too large." If there is no content-length, and the reply
#	size exceeds this limit, the client's connection is just closed
#	and they will receive a partial reply.
#
#	WARNING: downstream caches probably can not detect a partial reply
#	if there is no content-length header, so they will cache
#	partial responses and give them out as hits.  You should NOT
#	use this option if you have downstream caches.
#
#	If you set this parameter to zero (the default), there will be
#	no limit imposed.
#
#Default:
# reply_body_max_size 0 allow all

#  TAG: authenticate_ip_shortcircuit_access
#	Access list determining when shortcicuiting the authentication process
#	based on source IP cached credentials is acceptable. Use this to deny
#	using the ip auth cache on requests from child proxies or other source
#	ip's having multiple users.
#
#	See also authenticate_ip_shortcircuit_ttl directive
#
#Default:
# none


# OPTIONS FOR X-Forwarded-For
# -----------------------------------------------------------------------------

#  TAG: follow_x_forwarded_for
# Note: This option is only available if Squid is rebuilt with the
#       -DFOLLOW_X_FORWARDED_FOR option
#
#	Allowing or Denying the X-Forwarded-For header to be followed to
#	find the original source of a request.
#
#	Requests may pass through a chain of several other proxies
#	before reaching us.  The X-Forwarded-For header will contain a
#	comma-separated list of the IP addresses in the chain, with the
#	rightmost address being the most recent.
#
#	If a request reaches us from a source that is allowed by this
#	configuration item, then we consult the X-Forwarded-For header
#	to see where that host received the request from.  If the
#	X-Forwarded-For header contains multiple addresses, and if
#	acl_uses_indirect_client is on, then we continue backtracking
#	until we reach an address for which we are not allowed to
#	follow the X-Forwarded-For header, or until we reach the first
#	address in the list.  (If acl_uses_indirect_client is off, then
#	it's impossible to backtrack through more than one level of
#	X-Forwarded-For addresses.)
#
#	The end result of this process is an IP address that we will
#	refer to as the indirect client address.  This address may
#	be treated as the client address for access control, delay
#	pools and logging, depending on the acl_uses_indirect_client,
#	delay_pool_uses_indirect_client and log_uses_indirect_client
#	options.
#
#	SECURITY CONSIDERATIONS:
#
#		Any host for which we follow the X-Forwarded-For header
#		can place incorrect information in the header, and Squid
#		will use the incorrect information as if it were the
#		source address of the request.  This may enable remote
#		hosts to bypass any access control restrictions that are
#		based on the client's source addresses.
#
#	For example:
#
#		acl localhost src 127.0.0.1
#		acl my_other_proxy srcdomain .proxy.example.com
#		follow_x_forwarded_for allow localhost
#		follow_x_forwarded_for allow my_other_proxy
#
#Default:
# follow_x_forwarded_for deny all

#  TAG: acl_uses_indirect_client	on|off
# Note: This option is only available if Squid is rebuilt with the
#       -DFOLLOW_X_FORWARDED_FOR option
#
#	Controls whether the indirect client address
#	(see follow_x_forwarded_for) is used instead of the
#	direct client address in acl matching.
#
#Default:
# acl_uses_indirect_client on

#  TAG: delay_pool_uses_indirect_client	on|off
# Note: This option is only available if Squid is rebuilt with the
#       -DFOLLOW_X_FORWARDED_FOR option
#
#	Controls whether the indirect client address
#	(see follow_x_forwarded_for) is used instead of the
#	direct client address in delay pools.
#
#Default:
# delay_pool_uses_indirect_client on

#  TAG: log_uses_indirect_client	on|off
# Note: This option is only available if Squid is rebuilt with the
#       -DFOLLOW_X_FORWARDED_FOR option
#
#	Controls whether the indirect client address
#	(see follow_x_forwarded_for) is used instead of the
#	direct client address in the access log.
#
#Default:
# log_uses_indirect_client on


# SSL OPTIONS
# -----------------------------------------------------------------------------

#  TAG: ssl_unclean_shutdown
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Some browsers (especially MSIE) bugs out on SSL shutdown
#	messages.
#
#Default:
# ssl_unclean_shutdown off

#  TAG: ssl_engine
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	The OpenSSL engine to use. You will need to set this if you
#	would like to use hardware SSL acceleration for example.
#
#Default:
# none

#  TAG: sslproxy_client_certificate
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Client SSL Certificate to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_client_key
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Client SSL Key to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_version
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	SSL version level to use when proxying https:// URLs
#
#Default:
# sslproxy_version 1

#  TAG: sslproxy_options
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	SSL engine options to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_cipher
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	SSL cipher list to use when proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_cafile
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	file containing CA certificates to use when verifying server
#	certificates while proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_capath
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	directory containing CA certificates to use when verifying
#	server certificates while proxying https:// URLs
#
#Default:
# none

#  TAG: sslproxy_flags
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Various flags modifying the use of SSL while proxying https:// URLs:
#	    DONT_VERIFY_PEER    Accept certificates even if they fail to
#				verify.
#	    NO_DEFAULT_CA       Don't use the default CA list built in
#				to OpenSSL.
#
#Default:
# none

#  TAG: sslpassword_program
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Specify a program used for entering SSL key passphrases
#	when using encrypted SSL certificate keys. If not specified
#	keys must either be unencrypted, or Squid started with the -N
#	option to allow it to query interactively for the passphrase.
#
#Default:
# none


# NETWORK OPTIONS
# -----------------------------------------------------------------------------

#  TAG: http_port
#	Usage:	port [options]
#		hostname:port [options]
#		1.2.3.4:port [options]
#
#	The socket addresses where Squid will listen for HTTP client
#	requests.  You may specify multiple socket addresses.
#	There are three forms: port alone, hostname with port, and
#	IP address with port.  If you specify a hostname or IP
#	address, Squid binds the socket to that specific
#	address.  This replaces the old 'tcp_incoming_address'
#	option.  Most likely, you do not need to bind to a specific
#	address, so you can use the port number alone.
#
#	If you are running Squid in accelerator mode, you
#	probably want to listen on port 80 also, or instead.
#
#	The -I command line option will override the *first* port
#	specified here.
#
#	You may specify multiple socket addresses on multiple lines.
#
#	Options:
#
#	   transparent	Support for transparent interception of
#			outgoing requests without browser settings.
#
#	   tproxy	Support Linux TPROXY for spoofing outgoing
#			connections using the client IP address.
#
#	   accel	Accelerator mode. See also the related vhost,
#			vport and defaultsite directives.
#
#	   defaultsite=domainname
#			What to use for the Host: header if it is not present
#			in a request. Determines what site (not origin server)
#			accelerators should consider the default.
#			Defaults to visible_hostname:port if not set
#			May be combined with vport=NN to override the port number.
#			Implies accel.
#
#	   vhost	Accelerator mode using Host header for virtual
#			domain support. Implies accel.
#
#	   vport	Accelerator with IP based virtual host support.
#			Implies accel.
#
#	   vport=NN	As above, but uses specified port number rather
#			than the http_port number. Implies accel.
#
#	   allow-direct	Allow direct forwarding in accelerator mode. Normally
#	   		accelerated requests is denied direct forwarding as it
#			never_direct was used.
#
#	   urlgroup=	Default urlgroup to mark requests with (see
#			also acl urlgroup and url_rewrite_program)
#
#	   protocol=	Protocol to reconstruct accelerated requests with.
#			Defaults to http.
#
#	   no-connection-auth
#			Prevent forwarding of Microsoft connection oriented
#			authentication (NTLM, Negotiate and Kerberos)
#
#	   act-as-origin
#	   		Act is if this Squid is the origin server.
#			This currently means generate own Date: and
#			Expires: headers. Implies accel.
#
#	   http11	Enables HTTP/1.1 support to clients. The HTTP/1.1
#			support is still incomplete with an internal HTTP/1.0
#			hop, but should work with most clients. The main
#			HTTP/1.1 features missing due to this is forwarding
#			of requests using chunked transfer encoding (results
#			in 411) and forwarding of 1xx responses (silently
#			dropped)
#
#	   name=	Specifies a internal name for the port. Defaults to
#			the port specification (port or addr:port)
#
#	   tcpkeepalive[=idle,interval,timeout]
#			Enable TCP keepalive probes of idle connections
#			idle is the initial time before TCP starts probing
#			the connection, interval how often to probe, and
#			timeout the time before giving up.
#
#	If you run Squid on a dual-homed machine with an internal
#	and an external interface we recommend you to specify the
#	internal address:port in http_port. This way Squid will only be
#	visible on the internal address.
#
# Squid normally listens to port 3128
http_port 3128 transparent

#  TAG: https_port
# Note: This option is only available if Squid is rebuilt with the
#       --enable-ssl option
#
#	Usage:  [ip:]port cert=certificate.pem [key=key.pem] [options...]
#
#	The socket address where Squid will listen for HTTPS client
#	requests.
#
#	This is really only useful for situations where you are running
#	squid in accelerator mode and you want to do the SSL work at the
#	accelerator level.
#
#	You may specify multiple socket addresses on multiple lines,
#	each with their own SSL certificate and/or options.
#
#	Options:
#
#	In addition to the options specified for http_port the folling
#	SSL related options is supported:
#
#	   cert=	Path to SSL certificate (PEM format).
#
#	   key=		Path to SSL private key file (PEM format)
#			if not specified, the certificate file is
#			assumed to be a combined certificate and
#			key file.
#
#	   version=	The version of SSL/TLS supported
#			    1	automatic (default)
#			    2	SSLv2 only
#			    3	SSLv3 only
#			    4	TLSv1 only
#
#	   cipher=	Colon separated list of supported ciphers.
#
#	   options=	Various SSL engine options. The most important
#			being:
#			    NO_SSLv2  Disallow the use of SSLv2
#			    NO_SSLv3  Disallow the use of SSLv3
#			    NO_TLSv1  Disallow the use of TLSv1
#			    SINGLE_DH_USE Always create a new key when using
#				      temporary/ephemeral DH key exchanges
#			See src/ssl_support.c or OpenSSL SSL_CTX_set_options
#			documentation for a complete list of options.
#
#	   clientca=	File containing the list of CAs to use when
#			requesting a client certificate.
#
#	   cafile=	File containing additional CA certificates to
#			use when verifying client certificates. If unset
#			clientca will be used.
#
#	   capath=	Directory containing additional CA certificates
#			and CRL lists to use when verifying client certificates.
#
#	   crlfile=	File of additional CRL lists to use when verifying
#			the client certificate, in addition to CRLs stored in
#			the capath. Implies VERIFY_CRL flag below.
#
#	   dhparams=	File containing DH parameters for temporary/ephemeral
#			DH key exchanges.
#
#	   sslflags=	Various flags modifying the use of SSL:
#			    DELAYED_AUTH
#				Don't request client certificates
#				immediately, but wait until acl processing
#				requires a certificate (not yet implemented).
#			    NO_DEFAULT_CA
#				Don't use the default CA lists built in
#				to OpenSSL.
#			    NO_SESSION_REUSE
#				Don't allow for session reuse. Each connection
#				will result in a new SSL session.
#			    VERIFY_CRL
#				Verify CRL lists when accepting client
#				certificates.
#			    VERIFY_CRL_ALL
#				Verify CRL lists for all certificates in the
#				client certificate chain.
#
#	   sslcontext=	SSL session ID context identifier.
#
#
#Default:
# none

#  TAG: tcp_outgoing_tos
#	Allows you to select a TOS/Diffserv value to mark outgoing
#	connections with, based on the username or source address
#	making the request.
#
#	tcp_outgoing_tos ds-field [!]aclname ...
#
#	Example where normal_service_net uses the TOS value 0x00
#	and good_service_net uses 0x20
#
#	acl normal_service_net src 10.0.0.0/255.255.255.0
#	acl good_service_net src 10.0.1.0/255.255.255.0
#	tcp_outgoing_tos 0x00 normal_service_net
#	tcp_outgoing_tos 0x20 good_service_net
#
#	TOS/DSCP values really only have local significance - so you should
#	know what you're specifying. For more information, see RFC2474 and
#	RFC3260.
#
#	The TOS/DSCP byte must be exactly that - a octet value  0 - 255, or
#	"default" to use whatever default your host has. Note that in
#	practice often only values 0 - 63 is usable as the two highest bits
#	have been redefined for use by ECN (RFC3168).
#
#	Processing proceeds in the order specified, and stops at first fully
#	matching line.
#
#	Note: The use of this directive using client dependent ACLs is
#	incompatible with the use of server side persistent connections. To
#	ensure correct results it is best to set server_persisten_connections
#	to off when using this directive in such configurations.
#
#Default:
# none

#  TAG: tcp_outgoing_address
#	Allows you to map requests to different outgoing IP addresses
#	based on the username or source address of the user making
#	the request.
#
#	tcp_outgoing_address ipaddr [[!]aclname] ...
#
#	Example where requests from 10.0.0.0/24 will be forwarded
#	with source address 10.1.0.1, 10.0.2.0/24 forwarded with
#	source address 10.1.0.2 and the rest will be forwarded with
#	source address 10.1.0.3.
#
#	acl normal_service_net src 10.0.0.0/24
#	acl good_service_net src 10.0.1.0/24 10.0.2.0/24
#	tcp_outgoing_address 10.1.0.1 normal_service_net
#	tcp_outgoing_address 10.1.0.2 good_service_net
#	tcp_outgoing_address 10.1.0.3
#
#	Processing proceeds in the order specified, and stops at first fully
#	matching line.
#
#	Note: The use of this directive using client dependent ACLs is
#	incompatible with the use of server side persistent connections. To
#	ensure correct results it is best to set server_persistent_connections
#	to off when using this directive in such configurations.
#
#Default:
# none

#  TAG: zph_mode
#	This option enables packet level marking of HIT/MISS responses,
#	either using IP TOS or socket priority.
#	    off		Feature disabled
#	    tos		Set the IP TOS/Diffserv field
#	    priority	Set the socket priority (may get mapped to TOS by OS,
#			otherwise only usable in local rulesets)
#	    option	Embed the mark in an IP option field. See also
#	    		zph_option.
#
#	See also tcp_outgoing_tos for details/requirements about TOS usage.
#
#Default:
# zph_mode off

#  TAG: zph_local
#	Allows you to select a TOS/Diffserv/Priority value to mark local hits.
#	Default: 0 (disabled).
#
#Default:
# zph_local 0

#  TAG: zph_sibling
#	Allows you to select a TOS/Diffserv/Priority value to mark sibling hits.
#	Default: 0 (disabled).
#
#Default:
# zph_sibling 0

#  TAG: zph_parent
#	Allows you to select a TOS/Diffserv/Priority value to mark parent hits. 
#	Default: 0 (disabled).
#
#Default:
# zph_parent 0

#  TAG: zph_option
#	The IP option to use when zph_mode is set to "option". Defaults to
#	136 which is officially registered as "SATNET Stream ID".
#
#Default:
# zph_option 136


# OPTIONS WHICH AFFECT THE NEIGHBOR SELECTION ALGORITHM
# -----------------------------------------------------------------------------

#  TAG: cache_peer
#	To specify other caches in a hierarchy, use the format:
#
#		cache_peer hostname type http-port icp-port [options]
#
#	For example,
#
#	#                                        proxy  icp
#	#          hostname             type     port   port  options
#	#          -------------------- -------- ----- -----  -----------
#	cache_peer parent.foo.net       parent    3128  3130  proxy-only default
#	cache_peer sib1.foo.net         sibling   3128  3130  proxy-only
#	cache_peer sib2.foo.net         sibling   3128  3130  proxy-only
#
#	      type:  either 'parent', 'sibling', or 'multicast'.
#
#	proxy-port:  The port number where the cache listens for proxy
#		     requests.
#
#	  icp-port:  Used for querying neighbor caches about
#		     objects.  To have a non-ICP neighbor
#		     specify '7' for the ICP port and make sure the
#		     neighbor machine has the UDP echo port
#		     enabled in its /etc/inetd.conf file.
#		NOTE: Also requires icp_port option enabled to send/receive
#		      requests via this method.
#
#	    options: proxy-only
#		     weight=n
#		     ttl=n
#		     no-query
#		     default
#		     round-robin
#		     carp
#		     multicast-responder
#		     multicast-siblings
#		     closest-only
#		     no-digest
#		     no-netdb-exchange
#		     no-delay
#		     login=user:password | PASS | *:password
#		     connect-timeout=nn
#		     digest-url=url
#		     allow-miss
#		     max-conn=n
#		     htcp
#		     htcp-oldsquid
#		     originserver
#		     userhash
#		     sourcehash
#		     name=xxx
#		     monitorurl=url
#		     monitorsize=sizespec
#		     monitorinterval=seconds
#		     monitortimeout=seconds
#		     forceddomain=name
#		     ssl
#		     sslcert=/path/to/ssl/certificate
#		     sslkey=/path/to/ssl/key
#		     sslversion=1|2|3|4
#		     sslcipher=...
#		     ssloptions=...
#		     front-end-https[=on|auto]
#		     connection-auth[=on|off|auto]
#		     idle=n
#		     http11
#
#		     use 'proxy-only' to specify objects fetched
#		     from this cache should not be saved locally.
#
#		     use 'weight=n' to affect the selection of a peer
#		     during any weighted peer-selection mechanisms.
#		     The weight must be an integer; default is 1,
#		     larger weights are favored more.
#		     This option does not affect parent selection if a peering
#		     protocol is not in use.
#
#		     use 'ttl=n' to specify a IP multicast TTL to use
#		     when sending an ICP queries to this address.
#		     Only useful when sending to a multicast group.
#		     Because we don't accept ICP replies from random
#		     hosts, you must configure other group members as
#		     peers with the 'multicast-responder' option below.
#
#		     use 'no-query' to NOT send ICP queries to this
#		     neighbor.
#
#		     use 'default' if this is a parent cache which can
#		     be used as a "last-resort" if a peer cannot be located
#		     by any of the peer-selection mechanisms.
#		     If specified more than once, only the first is used.
#
#		     use 'round-robin' to define a set of parents which
#		     should be used in a round-robin fashion in the
#		     absence of any ICP queries.
#
#		     use 'carp' to define a set of parents which should
#		     be used as a CARP array. The requests will be
#		     distributed among the parents based on the CARP load
#		     balancing hash function based on their weight.
#
#		     'multicast-responder' indicates the named peer
#		     is a member of a multicast group.  ICP queries will
#		     not be sent directly to the peer, but ICP replies
#		     will be accepted from it.
#
#		     the 'multicast-siblings' option is meant to be used
#		     only for cache peers of type "multicast". It instructs
#		     Squid that ALL members of this multicast group have
#		     "sibling" relationship with it, not "parent".  This is
#		     an optimization that avoids useless multicast queries
#		     to a multicast group when the requested object would
#		     be fetched only from a "parent" cache, anyway.  It's
#		     useful, e.g., when configuring a pool of redundant
#		     Squid proxies, being members of the same
#		     multicast group.
#
#		     'closest-only' indicates that, for ICP_OP_MISS
#		     replies, we'll only forward CLOSEST_PARENT_MISSes
#		     and never FIRST_PARENT_MISSes.
#
#		     use 'no-digest' to NOT request cache digests from
#		     this neighbor.
#
#		     'no-netdb-exchange' disables requesting ICMP
#		     RTT database (NetDB) from the neighbor.
#
#		     use 'no-delay' to prevent access to this neighbor
#		     from influencing the delay pools.
#
#		     use 'login=user:password' if this is a personal/workgroup
#		     proxy and your parent requires proxy authentication.
#		     Note: The string can include URL escapes (i.e. %20 for
#		     spaces). This also means % must be written as %%.
#
#		     use 'login=PASS' if users must authenticate against
#		     the upstream proxy or in the case of a reverse proxy
#		     configuration, the origin web server.  This will pass
#		     the users credentials as they are to the peer.
#		     Note: To combine this with local authentication the Basic
#		     authentication scheme must be used, and both servers must
#		     share the same user database as HTTP only allows for
#		     a single login (one for proxy, one for origin server).
#		     Also be warned this will expose your users proxy
#		     password to the peer. USE WITH CAUTION
#
#		     use 'login=*:password' to pass the username to the
#		     upstream cache, but with a fixed password. This is meant
#		     to be used when the peer is in another administrative
#		     domain, but it is still needed to identify each user.
#		     The star can optionally be followed by some extra
#		     information which is added to the username. This can
#		     be used to identify this proxy to the peer, similar to
#		     the login=username:password option above.
#
#		     use 'connect-timeout=nn' to specify a peer
#		     specific connect timeout (also see the
#		     peer_connect_timeout directive)
#
#		     use 'digest-url=url' to tell Squid to fetch the cache
#		     digest (if digests are enabled) for this host from
#		     the specified URL rather than the Squid default
#		     location.
#
#		     use 'allow-miss' to disable Squid's use of only-if-cached
#		     when forwarding requests to siblings. This is primarily
#		     useful when icp_hit_stale is used by the sibling. To
#		     extensive use of this option may result in forwarding
#		     loops, and you should avoid having two-way peerings
#		     with this option. (for example to deny peer usage on
#		     requests from peer by denying cache_peer_access if the
#		     source is a peer)
#
#		     use 'max-conn=n' to limit the amount of connections Squid
#		     may open to this peer.
#
#		     use 'htcp' to send HTCP, instead of ICP, queries
#		     to the neighbor.  You probably also want to
#		     set the "icp port" to 4827 instead of 3130.
#		     You must also allow this Squid htcp_access and
#		     http_access in the peer Squid configuration.
#
#		     use 'htcp-oldsquid' to send HTCP to old Squid versions
#		     You must also allow this Squid htcp_access and
#		     http_access in the peer Squid configuration.
#
#		     'originserver' causes this parent peer to be contacted as
#		     a origin server. Meant to be used in accelerator setups.
#
#		     use 'userhash' to load-balance amongst a set of parents
#		     based on the client proxy_auth or ident username.
#
#		     use 'sourcehash' to load-balance amongst a set of parents
#		     based on the client source ip.
#
#		     use 'name=xxx' if you have multiple peers on the same
#		     host but different ports. This name can be used to
#		     differentiate the peers in cache_peer_access and similar
#		     directives.
#
#		     use 'monitorurl=url' to have periodically request a given
#		     URL from the peer, and only consider the peer as alive
#		     if this monitoring is successful (default none)
#
#		     use 'monitorsize=min[-max]' to limit the size range of
#		     'monitorurl' replies considered valid. Defaults to 0 to
#		     accept any size replies as valid.
#
#		     use 'monitorinterval=seconds' to change frequency of
#		     how often the peer is monitored with 'monitorurl'
#		     (default 300 for a 5 minute interval). If set to 0
#		     then monitoring is disabled even if a URL is defined.
#
#		     use 'monitortimeout=seconds' to change the timeout of
#		     'monitorurl'. Defaults to 'monitorinterval'.
#
#		     use 'forceddomain=name' to forcibly set the Host header
#		     of requests forwarded to this peer. Useful in accelerator
#		     setups where the server (peer) expects a certain domain
#		     name and using redirectors to feed this domain name
#		     is not feasible.
#
#		     use 'ssl' to indicate connections to this peer should
#		     be SSL/TLS encrypted.
#
#		     use 'sslcert=/path/to/ssl/certificate' to specify a client
#		     SSL certificate to use when connecting to this peer.
#
#		     use 'sslkey=/path/to/ssl/key' to specify the private SSL
#		     key corresponding to sslcert above. If 'sslkey' is not
#		     specified 'sslcert' is assumed to reference a
#		     combined file containing both the certificate and the key.
#
#		     use sslversion=1|2|3|4 to specify the SSL version to use
#		     when connecting to this peer
#			1 = automatic (default)
#			2 = SSL v2 only
#			3 = SSL v3 only
#			4 = TLS v1 only
#
#		     use sslcipher=... to specify the list of valid SSL ciphers
#		     to use when connecting to this peer.
#
#		     use ssloptions=... to specify various SSL engine options:
#			NO_SSLv2  Disallow the use of SSLv2
#			NO_SSLv3  Disallow the use of SSLv3
#			NO_TLSv1  Disallow the use of TLSv1
#		     See src/ssl_support.c or the OpenSSL documentation for
#		     a more complete list.
#
#		     use sslcafile=... to specify a file containing
#		     additional CA certificates to use when verifying the
#		     peer certificate.
#
#		     use sslcapath=... to specify a directory containing
#		     additional CA certificates to use when verifying the
#		     peer certificate.
#
#		     use sslcrlfile=... to specify a certificate revocation
#		     list file to use when verifying the peer certificate.
#
#		     use sslflags=... to specify various flags modifying the
#		     SSL implementation:
#			DONT_VERIFY_PEER
#				Accept certificates even if they fail to
#				verify.
#			NO_DEFAULT_CA
#				Don't use the default CA list built in
#				to OpenSSL.
#
#		     use ssldomain= to specify the peer name as advertised
#		     in it's certificate. Used for verifying the correctness
#		     of the received peer certificate. If not specified the
#		     peer hostname will be used.
#
#		     use front-end-https to enable the "Front-End-Https: On"
#		     header needed when using Squid as a SSL frontend in front
#		     of Microsoft OWA. See MS KB document Q307347 for details
#		     on this header. If set to auto the header will
#		     only be added if the request is forwarded as a https://
#		     URL.
#
#		     use connection-auth=off to tell Squid that this peer does
#		     not support Microsoft connection oriented authentication,
#		     and any such challenges received from there should be
#		     ignored. Default is auto to automatically determine the
#		     status of the peer.
#
#		     use idle=n to specify a minimum number of idle connections
#		     that should be kept open to this peer.
#
#		     use http11 to send requests using HTTP/1.1 to this peer.
#		     Note: The HTTP/1.1 support is still incomplete, with an
#		     internal HTTP/1.0 hop. As result 1xx responses will not
#		     be forwarded.
#
#Default:
# none

#  TAG: cache_peer_domain
#	Use to limit the domains for which a neighbor cache will be
#	queried.  Usage:
#
#	cache_peer_domain cache-host domain [domain ...]
#	cache_peer_domain cache-host !domain
#
#	For example, specifying
#
#		cache_peer_domain parent.foo.net	.edu
#
#	has the effect such that UDP query packets are sent to
#	'bigserver' only when the requested object exists on a
#	server in the .edu domain.  Prefixing the domain name
#	with '!' means the cache will be queried for objects
#	NOT in that domain.
#
#	NOTE:	* Any number of domains may be given for a cache-host,
#		  either on the same or separate lines.
#		* When multiple domains are given for a particular
#		  cache-host, the first matched domain is applied.
#		* Cache hosts with no domain restrictions are queried
#		  for all requests.
#		* There are no defaults.
#		* There is also a 'cache_peer_access' tag in the ACL
#		  section.
#
#Default:
# none

#  TAG: cache_peer_access
#	Similar to 'cache_peer_domain' but provides more flexibility by
#	using ACL elements.
#
#	cache_peer_access cache-host allow|deny [!]aclname ...
#
#	The syntax is identical to 'http_access' and the other lists of
#	ACL elements.  See the comments for 'http_access' below, or
#	the Squid FAQ (http://www.squid-cache.org/FAQ/FAQ-10.html).
#
#Default:
# none

#  TAG: neighbor_type_domain
#	usage: neighbor_type_domain neighbor parent|sibling domain domain ...
#
#	Modifying the neighbor type for specific domains is now
#	possible.  You can treat some domains differently than the the
#	default neighbor type specified on the 'cache_peer' line.
#	Normally it should only be necessary to list domains which
#	should be treated differently because the default neighbor type
#	applies for hostnames which do not match domains listed here.
#
#EXAMPLE:
#	cache_peer cache.foo.org parent 3128 3130
#	neighbor_type_domain cache.foo.org sibling .com .net
#	neighbor_type_domain cache.foo.org sibling .au .de
#
#Default:
# none

#  TAG: dead_peer_timeout	(seconds)
#	This controls how long Squid waits to declare a peer cache
#	as "dead."  If there are no ICP replies received in this
#	amount of time, Squid will declare the peer dead and not
#	expect to receive any further ICP replies.  However, it
#	continues to send ICP queries, and will mark the peer as
#	alive upon receipt of the first subsequent ICP reply.
#
#	This timeout also affects when Squid expects to receive ICP
#	replies from peers.  If more than 'dead_peer' seconds have
#	passed since the last ICP reply was received, Squid will not
#	expect to receive an ICP reply on the next query.  Thus, if
#	your time between requests is greater than this timeout, you
#	will see a lot of requests sent DIRECT to origin servers
#	instead of to your parents.
#
#Default:
# dead_peer_timeout 10 seconds

#  TAG: hierarchy_stoplist
#	A list of words which, if found in a URL, cause the object to
#	be handled directly by this cache.  In other words, use this
#	to not query neighbor caches for certain objects.  You may
#	list this option multiple times. Note: never_direct overrides
#	this option.
#We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?


# MEMORY CACHE OPTIONS
# -----------------------------------------------------------------------------

#  TAG: cache_mem	(bytes)
#	NOTE: THIS PARAMETER DOES NOT SPECIFY THE MAXIMUM PROCESS SIZE.
#	IT ONLY PLACES A LIMIT ON HOW MUCH ADDITIONAL MEMORY SQUID WILL
#	USE AS A MEMORY CACHE OF OBJECTS. SQUID USES MEMORY FOR OTHER
#	THINGS AS WELL. SEE THE SQUID FAQ SECTION 8 FOR DETAILS.
#
#	'cache_mem' specifies the ideal amount of memory to be used
#	for:
#		* In-Transit objects
#		* Hot Objects
#		* Negative-Cached objects
#
#	Data for these objects are stored in 4 KB blocks.  This
#	parameter specifies the ideal upper limit on the total size of
#	4 KB blocks allocated.  In-Transit objects take the highest
#	priority.
#
#	In-transit objects have priority over the others.  When
#	additional space is needed for incoming data, negative-cached
#	and hot objects will be released.  In other words, the
#	negative-cached and hot objects will fill up any unused space
#	not needed for in-transit objects.
#
#	If circumstances require, this limit will be exceeded.
#	Specifically, if your incoming request rate requires more than
#	'cache_mem' of memory to hold in-transit objects, Squid will
#	exceed this limit to satisfy the new requests.  When the load
#	decreases, blocks will be freed until the high-water mark is
#	reached.  Thereafter, blocks will be used to store hot
#	objects.
#
#Default:
# cache_mem 8 MB

#  TAG: maximum_object_size_in_memory	(bytes)
#	Objects greater than this size will not be attempted to kept in
#	the memory cache. This should be set high enough to keep objects
#	accessed frequently in memory to improve performance whilst low
#	enough to keep larger objects from hoarding cache_mem.
#
#Default:
# maximum_object_size_in_memory 8 KB

#  TAG: memory_replacement_policy
#	The memory replacement policy parameter determines which
#	objects are purged from memory when memory space is needed.
#
#	See cache_replacement_policy for details.
#
#Default:
# memory_replacement_policy lru


# DISK CACHE OPTIONS
# -----------------------------------------------------------------------------

#  TAG: cache_replacement_policy
#	The cache replacement policy parameter determines which
#	objects are evicted (replaced) when disk space is needed.
#
#	    lru       : Squid's original list based LRU policy
#	    heap GDSF : Greedy-Dual Size Frequency
#	    heap LFUDA: Least Frequently Used with Dynamic Aging
#	    heap LRU  : LRU policy implemented using a heap
#
#	Applies to any cache_dir lines listed below this.
#
#	The LRU policies keeps recently referenced objects.
#
#	The heap GDSF policy optimizes object hit rate by keeping smaller
#	popular objects in cache so it has a better chance of getting a
#	hit.  It achieves a lower byte hit rate than LFUDA though since
#	it evicts larger (possibly popular) objects.
#
#	The heap LFUDA policy keeps popular objects in cache regardless of
#	their size and thus optimizes byte hit rate at the expense of
#	hit rate since one large, popular object will prevent many
#	smaller, slightly less popular objects from being cached.
#
#	Both policies utilize a dynamic aging mechanism that prevents
#	cache pollution that can otherwise occur with frequency-based
#	replacement policies.
#
#	NOTE: if using the LFUDA replacement policy you should increase
#	the value of maximum_object_size above its default of 4096 KB to
#	to maximize the potential byte hit rate improvement of LFUDA.
#
#	For more information about the GDSF and LFUDA cache replacement
#	policies see http://www.hpl.hp.com/techreports/1999/HPL-1999-69.html
#	and http://fog.hpl.external.hp.com/techreports/98/HPL-98-173.html.
#
#Default:
# cache_replacement_policy lru

#  TAG: cache_dir
#	Usage:
#
#	cache_dir Type Directory-Name Fs-specific-data [options]
#
#	You can specify multiple cache_dir lines to spread the
#	cache among different disk partitions.
#
#	Type specifies the kind of storage system to use. Only "ufs"
#	is built by default. To enable any of the other storage systems
#	see the --enable-storeio configure option.
#
#	'Directory' is a top-level directory where cache swap
#	files will be stored. If you want to use an entire disk
#	for caching, this can be the mount-point directory.
#	The directory must exist and be writable by the Squid
#	process. Squid will NOT create this directory for you.
#	Only using COSS, a raw disk device or a stripe file can
#	be specified, but the configuration of the "cache_swap_log"
#	tag is mandatory.
#
#	The ufs store type:
#
#	"ufs" is the old well-known Squid storage format that has always
#	been there.
#
#	cache_dir ufs Directory-Name Mbytes L1 L2 [options]
#
#	'Mbytes' is the amount of disk space (MB) to use under this
#	directory.  The default is 100 MB.  Change this to suit your
#	configuration.  Do NOT put the size of your disk drive here.
#	Instead, if you want Squid to use the entire disk drive,
#	subtract 20% and use that value.
#
#	'Level-1' is the number of first-level subdirectories which
#	will be created under the 'Directory'.  The default is 16.
#
#	'Level-2' is the number of second-level subdirectories which
#	will be created under each first-level directory.  The default
#	is 256.
#
#	The aufs store type:
#
#	"aufs" uses the same storage format as "ufs", utilizing
#	POSIX-threads to avoid blocking the main Squid process on
#	disk-I/O. This was formerly known in Squid as async-io.
#
#	cache_dir aufs Directory-Name Mbytes L1 L2 [options]
#
#	see argument descriptions under ufs above
#
#	The diskd store type:
#
#	"diskd" uses the same storage format as "ufs", utilizing a
#	separate process to avoid blocking the main Squid process on
#	disk-I/O.
#
#	cache_dir diskd Directory-Name Mbytes L1 L2 [options] [Q1=n] [Q2=n]
#
#	see argument descriptions under ufs above
#
#	Q1 specifies the number of unacknowledged I/O requests when Squid
#	stops opening new files. If this many messages are in the queues,
#	Squid won't open new files. Default is 64
#
#	Q2 specifies the number of unacknowledged messages when Squid
#	starts blocking.  If this many messages are in the queues,
#	Squid blocks until it receives some replies. Default is 72
#
#	When Q1 < Q2 (the default), the cache directory is optimized
#	for lower response time at the expense of a decrease in hit
#	ratio.  If Q1 > Q2, the cache directory is optimized for
#	higher hit ratio at the expense of an increase in response
#	time.
#
#	The coss store type:
#
#	block-size=n defines the "block size" for COSS cache_dir's.
#	Squid uses file numbers as block numbers.  Since file numbers
#	are limited to 24 bits, the block size determines the maximum
#	size of the COSS partition.  The default is 512 bytes, which
#	leads to a maximum cache_dir size of 512<<24, or 8 GB.  Note
#	you should not change the COSS block size after Squid
#	has written some objects to the cache_dir.
#
#	overwrite-percent=n defines the percentage of disk that COSS
#	must write to before a given object will be moved to the
#	current stripe.  A value of "n" closer to 100 will cause COSS
#	to waste less disk space by having multiple copies of an object
#	on disk, but will increase the chances of overwriting a popular
#	object as COSS overwrites stripes.  A value of "n" close to 0
#	will cause COSS to keep all current objects in the current COSS
#	stripe at the expense of the hit rate.  The default value of 50
#	will allow any given object to be stored on disk a maximum of
#	2 times.
#
#	max-stripe-waste=n defines the maximum amount of space that COSS
#	will waste in a given stripe (in bytes).  When COSS writes data
#	to disk, it will potentially waste up to "max-size" worth of disk
#	space for each 1MB of data written.  If "max-size" is set to a
#	large value (ie >256k), this could potentially result in large
#	amounts of wasted disk space. Setting this value to a lower value
#	(ie 64k or 32k) will result in a COSS disk refusing to cache
#	larger objects until the COSS stripe has been filled to within
#	"max-stripe-waste" of the maximum size (1MB).
#
#	membufs=n defines the number of "memory-only" stripes that COSS
#	will use.  When an cache hit is performed on a COSS stripe before
#	COSS has reached the overwrite-percent value for that object,
#	COSS will use a series of memory buffers to hold the object in
#	while the data is sent to the client.  This will define the maximum
#	number of memory-only buffers that COSS will use.  The default value
#	is 10, which will use a maximum of 10MB of memory for buffers.
#
#	maxfullbufs=n defines the maximum number of stripes a COSS partition
#	will have in memory waiting to be freed (either because the disk is
#	under load and the stripe is unwritten, or because clients are still
#	transferring data from objects using the memory).  In order to try
#	and maintain a good hit rate under load, COSS will reserve the last
#	2 full stripes for object hits. (ie a COSS cache_dir will reject
#	new objects when the number of full stripes is 2 less than maxfullbufs)
#
#	The null store type:
#
#	no options are allowed or required
#
#	Common options:
#
#	no-store, no new objects should be stored to this cache_dir
#
#	min-size=n, refers to the min object size this storedir will accept.
#	It's used to restrict a storedir to only store large objects
#	(e.g. aufs) while other storedirs are optimized for smaller objects
#	(e.g. COSS). Defaults to 0.
#
#	max-size=n, refers to the max object size this storedir supports.
#	It is used to initially choose the storedir to dump the object.
#	Note: To make optimal use of the max-size limits you should order
#	the cache_dir lines with the smallest max-size value first and the
#	ones with no max-size specification last.
#
#	Note that for coss, max-size must be less than COSS_MEMBUF_SZ
#	(hard coded at 1 MB).
#
#	Note for FreeBSD users:
#	COSS -- like aufs -- uses async IO so if you compiled Squid without
#	support for the aufs storage type, COSS will use POSIX AIO.
#	This means that you need to add the line
#
#	options VFS_AIO
#
#	to your kernel configuration in order to use COSS.
#
#	On FreeBSD 5 and higher you can load the aio(4) module and do not
#	necessarily need to recompile your kernel.
#
#	If you compiled Squid with both support for aufs and COSS, COSS
#	will use aufs' routines and does not need special kernel support.
#
#Default:
# cache_dir ufs /var/squid/cache 100 16 256

#  TAG: store_dir_select_algorithm
#	Set this to 'round-robin' as an alternative.
#
#Default:
# store_dir_select_algorithm least-load

#  TAG: max_open_disk_fds
#	To avoid having disk as the I/O bottleneck Squid can optionally
#	bypass the on-disk cache if more than this amount of disk file
#	descriptors are open.
#
#	A value of 0 indicates no limit.
#
#Default:
# max_open_disk_fds 0

#  TAG: minimum_object_size	(bytes)
#	Objects smaller than this size will NOT be saved on disk.  The
#	value is specified in kilobytes, and the default is 0 KB, which
#	means there is no minimum.
#
#Default:
# minimum_object_size 0 KB

#  TAG: maximum_object_size	(bytes)
#	Objects larger than this size will NOT be saved on disk.  The
#	value is specified in kilobytes, and the default is 4MB.  If
#	you wish to get a high BYTES hit ratio, you should probably
#	increase this (one 32 MB object hit counts for 3200 10KB
#	hits).  If you wish to increase speed more than your want to
#	save bandwidth you should leave this low.
#
#	NOTE: if using the LFUDA replacement policy you should increase
#	this value to maximize the byte hit rate improvement of LFUDA!
#	See replacement_policy below for a discussion of this policy.
#
#Default:
# maximum_object_size 4096 KB

#  TAG: cache_swap_low	(percent, 0-100)
#  TAG: cache_swap_high	(percent, 0-100)
#
#	The low- and high-water marks for cache object replacement.
#	Replacement begins when the swap (disk) usage is above the
#	low-water mark and attempts to maintain utilization near the
#	low-water mark.  As swap utilization gets close to high-water
#	mark object eviction becomes more aggressive.  If utilization is
#	close to the low-water mark less replacement is done each time.
#
#	Defaults are 90% and 95%. If you have a large cache, 5% could be
#	hundreds of MB. If this is the case you may wish to set these
#	numbers closer together.
#
#Default:
# cache_swap_low 90
# cache_swap_high 95

#  TAG: update_headers	on|off
#	By default Squid updates stored HTTP headers when receiving
#	a 304 response. Set this to off if you want to disable this
#	for disk I/O performance reasons. Disabling this VIOLATES the
#	HTTP standard, and could make you liable for problems which it
#	causes.
#
#Default:
# update_headers on


# LOGFILE OPTIONS
# -----------------------------------------------------------------------------

#  TAG: logformat
#	Usage:
#
#	logformat <name> <format specification>
#
#	Defines an access log format.
#
#	The <format specification> is a string with embedded % format codes
#
#	% format codes all follow the same basic structure where all but
#	the formatcode is optional. Output strings are automatically escaped
#	as required according to their context and the output format
#	modifiers are usually not needed, but can be specified if an explicit
#	output format is desired.
#
#		% ["|[|'|#] [-] [[0]width] [{argument}] formatcode
#
#		"	output in quoted string format
#		[	output in squid text log format as used by log_mime_hdrs
#		#	output in URL quoted format
#		'	output as-is
#
#		-	left aligned
#		width	field width. If starting with 0 the
#			output is zero padded
#		{arg}	argument such as header name etc
#
#	Format codes:
#
#		>a	Client source IP address
#		>A	Client FQDN
#		>p	Client source port
#		<A	Server IP address or peer name
#		la	Local IP address (http_port)
#		lp	Local port number (http_port)
#		oa	Our outgoing IP address (tcp_outgoing_address)
#		ts	Seconds since epoch
#		tu	subsecond time (milliseconds)
#		tl	Local time. Optional strftime format argument
#			default %d/%b/%Y:%H:%M:%S %z
#		tg	GMT time. Optional strftime format argument
#			default %d/%b/%Y:%H:%M:%S %z
#		tr	Response time (milliseconds)
#		>h	Request header. Optional header name argument
#			on the format header[:[separator]element]
#		<h	Reply header. Optional header name argument
#			as for >h
#		un	User name
#		ul	User name from authentication
#		ui	User name from ident
#		us	User name from SSL
#		ue	User name from external acl helper
#		Hs	HTTP status code
#		Ss	Squid request status (TCP_MISS etc)
#		Sh	Squid hierarchy status (DEFAULT_PARENT etc)
#		mt	MIME content type
#		rm	Request method (GET/POST etc)
#		ru	Request URL
#		rp	Request URL-Path excluding hostname
#		rv	Request protocol version
#		ea	Log string returned by external acl
#		<st	Reply size including HTTP headers
#		>st	Request size including HTTP headers
#		st	Request+Reply size including HTTP headers
#		sn	Unique sequence number per log line entry
#		%	a literal % character
#
#	The default formats available (which do not need re-defining) are:
#
#logformat squid %ts.%03tu %6tr %>a %Ss/%03Hs %<st %rm %ru %un %Sh/%<A %mt
#logformat squidmime %ts.%03tu %6tr %>a %Ss/%03Hs %<st %rm %ru %un %Sh/%<A %mt [%>h] [%<h]
#logformat common %>a %ui %un [%tl] "%rm %ru HTTP/%rv" %Hs %<st %Ss:%Sh
#logformat combined %>a %ui %un [%tl] "%rm %ru HTTP/%rv" %Hs %<st "%{Referer}>h" "%{User-Agent}>h" %Ss:%Sh
#
#Default:
# none

#  TAG: access_log
#	These files log client request activities. Has a line every HTTP or
#	ICP request. The format is:
#	access_log <filepath> [<logformat name> [acl acl ...]]
#	access_log none [acl acl ...]]
#
#	Will log to the specified file using the specified format (which
#	must be defined in a logformat directive) those entries which match
#	ALL the acl's specified (which must be defined in acl clauses).
#	If no acl is specified, all requests will be logged to this file.
#
#	To disable logging of a request use the filepath "none", in which case
#	a logformat name should not be specified.
#
#	To log the request via syslog specify a filepath of "syslog":
#
#	access_log syslog[:facility.priority] [format [acl1 [acl2 ....]]]
#	where facility could be any of:
#	authpriv, daemon, local0 .. local7 or user.
#
#	And priority could be any of:
#	err, warning, notice, info, debug.
access_log /var/squid/logs/access.log squid

#  TAG: log_access	allow|deny acl acl...
#	This options allows you to control which requests gets logged
#	to access.log (see access_log directive). Requests denied for
#	logging will also not be accounted for in performance counters.
#
#Default:
# none

#  TAG: logfile_daemon
#	Specify the path to the logfile-writing daemon. This daemon is
#	used to write the access and store logs, if configured.
#
#Default:
# logfile_daemon /usr/local/libexec/squid/logfile-daemon

#  TAG: cache_log
#	Cache logging file. This is where general information about
#	your cache's behavior goes. You can increase the amount of data
#	logged to this file with the "debug_options" tag below.
#
#Default:
# cache_log /var/squid/logs/cache.log

#  TAG: cache_store_log
#	Logs the activities of the storage manager.  Shows which
#	objects are ejected from the cache, and which objects are
#	saved and for how long.  To disable, enter "none". There are
#	not really utilities to analyze this data, so you can safely
#	disable it.
#
#Default:
# cache_store_log /var/squid/logs/store.log

#  TAG: cache_swap_state
#	Location for the cache "swap.state" file. This index file holds
#	the metadata of objects saved on disk.  It is used to rebuild
#	the cache during startup.  Normally this file resides in each
#	'cache_dir' directory, but you may specify an alternate
#	pathname here.  Note you must give a full filename, not just
#	a directory. Since this is the index for the whole object
#	list you CANNOT periodically rotate it!
#
#	If %s can be used in the file name it will be replaced with a
#	a representation of the cache_dir name where each / is replaced
#	with '.'. This is needed to allow adding/removing cache_dir
#	lines when cache_swap_log is being used.
#
#	If have more than one 'cache_dir', and %s is not used in the name
#	these swap logs will have names such as:
#
#		cache_swap_log.00
#		cache_swap_log.01
#		cache_swap_log.02
#
#	The numbered extension (which is added automatically)
#	corresponds to the order of the 'cache_dir' lines in this
#	configuration file.  If you change the order of the 'cache_dir'
#	lines in this file, these index files will NOT correspond to
#	the correct 'cache_dir' entry (unless you manually rename
#	them).  We recommend you do NOT use this option.  It is
#	better to keep these index files in each 'cache_dir' directory.
#
#Default:
# none

#  TAG: logfile_rotate
#	Specifies the number of logfile rotations to make when you
#	type 'squid -k rotate'.  The default is 10, which will rotate
#	with extensions 0 through 9.  Setting logfile_rotate to 0 will
#	disable the file name rotation, but the logfiles are still closed
#	and re-opened.  This will enable you to rename the logfiles
#	yourself just before sending the rotate signal.
#
#	Note, the 'squid -k rotate' command normally sends a USR1
#	signal to the running squid process.  In certain situations
#	(e.g. on Linux with Async I/O), USR1 is used for other
#	purposes, so -k rotate uses another signal.  It is best to get
#	in the habit of using 'squid -k rotate' instead of 'kill -USR1
#	<pid>'.
#
#Default:
# logfile_rotate 10

#  TAG: emulate_httpd_log	on|off
#	The Cache can emulate the log file format which many 'httpd'
#	programs use.  To disable/enable this emulation, set
#	emulate_httpd_log to 'off' or 'on'.  The default
#	is to use the native log format since it includes useful
#	information Squid-specific log analyzers use.
#
#Default:
# emulate_httpd_log off

#  TAG: log_ip_on_direct	on|off
#	Log the destination IP address in the hierarchy log tag when going
#	direct. Earlier Squid versions logged the hostname here. If you
#	prefer the old way set this to off.
#
#Default:
# log_ip_on_direct on

#  TAG: mime_table
#	Pathname to Squid's MIME table. You shouldn't need to change
#	this, but the default file contains examples and formatting
#	information if you do.
#
#Default:
# mime_table /usr/local/etc/squid/mime.conf

#  TAG: log_mime_hdrs	on|off
#	The Cache can record both the request and the response MIME
#	headers for each HTTP transaction.  The headers are encoded
#	safely and will appear as two bracketed fields at the end of
#	the access log (for either the native or httpd-emulated log
#	formats).  To enable this logging set log_mime_hdrs to 'on'.
#
#Default:
# log_mime_hdrs off

#  TAG: useragent_log
# Note: This option is only available if Squid is rebuilt with the
#       --enable-useragent-log option
#
#	Squid will write the User-Agent field from HTTP requests
#	to the filename specified here.  By default useragent_log
#	is disabled.
#
#Default:
# none

#  TAG: referer_log
# Note: This option is only available if Squid is rebuilt with the
#       --enable-referer-log option
#
#	Squid will write the Referer field from HTTP requests to the
#	filename specified here.  By default referer_log is disabled.
#	Note that "referer" is actually a misspelling of "referrer"
#	however the misspelt version has been accepted into the HTTP RFCs
#	and we accept both.
#
#Default:
# none

#  TAG: pid_filename
#	A filename to write the process-id to.  To disable, enter "none".
#
#	Note: If you change this setting, you need to set squid_pidfile
#	in /etc/rc.conf to reflect the new value. Please see
#	/usr/local/etc/rc.d/squid for details.
#
#Default:
# pid_filename /var/squid/logs/squid.pid

#  TAG: debug_options
#	Logging options are set as section,level where each source file
#	is assigned a unique section.  Lower levels result in less
#	output,  Full debugging (level 9) can result in a very large
#	log file, so be careful.  The magic word "ALL" sets debugging
#	levels for all sections.  We recommend normally running with
#	"ALL,1".
#
#Default:
# debug_options ALL,1

#  TAG: log_fqdn	on|off
#	Turn this on if you wish to log fully qualified domain names
#	in the access.log. To do this Squid does a DNS lookup of all
#	IP's connecting to it. This can (in some situations) increase
#	latency, which makes your cache seem slower for interactive
#	browsing.
#
#Default:
# log_fqdn off

#  TAG: client_netmask
#	A netmask for client addresses in logfiles and cachemgr output.
#	Change this to protect the privacy of your cache clients.
#	A netmask of 255.255.255.0 will log all IP's in that range with
#	the last digit set to '0'.
#
#Default:
# client_netmask 255.255.255.255

#  TAG: forward_log
# Note: This option is only available if Squid is rebuilt with the
#       --enable-forward-log option
#
#	Logs the server-side requests.
#
#	This is currently work in progress.
#
#Default:
# none

#  TAG: strip_query_terms
#	By default, Squid strips query terms from requested URLs before
#	logging.  This protects your user's privacy.
#
#Default:
# strip_query_terms on

#  TAG: buffered_logs	on|off
#	cache.log log file is written with stdio functions, and as such
#	it can be buffered or unbuffered. By default it will be unbuffered.
#	Buffering it can speed up the writing slightly (though you are
#	unlikely to need to worry unless you run with tons of debugging
#	enabled in which case performance will suffer badly anyway..).
#
#Default:
# buffered_logs off

#  TAG: netdb_filename
#	A filename where Squid stores it's netdb state between restarts.
#	To disable, enter "none".
#
#Default:
# netdb_filename /var/squid/logs/netdb.state


# OPTIONS FOR FTP GATEWAYING
# -----------------------------------------------------------------------------

#  TAG: ftp_user
#	If you want the anonymous login password to be more informative
#	(and enable the use of picky ftp servers), set this to something
#	reasonable for your domain, like wwwuser@somewhere.net
#
#	The reason why this is domainless by default is the
#	request can be made on the behalf of a user in any domain,
#	depending on how the cache is used.
#	Some ftp server also validate the email address is valid
#	(for example perl.com).
#
#Default:
# ftp_user Squid@

#  TAG: ftp_list_width
#	Sets the width of ftp listings. This should be set to fit in
#	the width of a standard browser. Setting this too small
#	can cut off long filenames when browsing ftp sites.
#
#Default:
# ftp_list_width 32

#  TAG: ftp_passive
#	If your firewall does not allow Squid to use passive
#	connections, turn off this option.
#
#Default:
# ftp_passive on

#  TAG: ftp_sanitycheck
#	For security and data integrity reasons Squid by default performs
#	sanity checks of the addresses of FTP data connections ensure the
#	data connection is to the requested server. If you need to allow
#	FTP connections to servers using another IP address for the data
#	connection turn this off.
#
#Default:
# ftp_sanitycheck on

#  TAG: ftp_telnet_protocol
#	The FTP protocol is officially defined to use the telnet protocol
#	as transport channel for the control connection. However, many
#	implementations are broken and does not respect this aspect of
#	the FTP protocol.
#
#	If you have trouble accessing files with ASCII code 255 in the
#	path or similar problems involving this ASCII code you can
#	try setting this directive to off. If that helps, report to the
#	operator of the FTP server in question that their FTP server
#	is broken and does not follow the FTP standard.
#
#Default:
# ftp_telnet_protocol on


# OPTIONS FOR EXTERNAL SUPPORT PROGRAMS
# -----------------------------------------------------------------------------

#  TAG: diskd_program
#	Specify the location of the diskd executable.
#	Note this is only useful if you have compiled in
#	diskd as one of the store io modules.
#
#Default:
# diskd_program /usr/local/libexec/squid/diskd-daemon

#  TAG: unlinkd_program
#	Specify the location of the executable for file deletion process.
#
#Default:
# unlinkd_program /usr/local/libexec/squid/unlinkd

#  TAG: pinger_program
# Note: This option is only available if Squid is rebuilt with the
#       --enable-icmp option
#
#	Specify the location of the executable for the pinger process.
#
#Default:
# pinger_program /usr/local/libexec/squid/pinger


# OPTIONS FOR URL REWRITING
# -----------------------------------------------------------------------------

#  TAG: storeurl_rewrite_program
#	Specify the location of the executable for the Store URL rewriter.
#	The Store URL rewriter allows URLs to be "normalised" ; mapping
#	multiple URLs to a single URL representation for cache operations.
#
#	For example, if you request an object at:
#
#	http://srv1.example.com/image.gif
#
#	and a subsequent request for:
#
#	http://srv2.example.com/image.gif
#
#	then Squid will treat these both as different URLs and cache them
#	seperately.
#
#	This is almost the normal case, but an increasing number of sites
#	distribute the same content between multiple frontend hosts.
#	The Store URL rewriter allows you to rewrite these URLs to one URL
#	to use for cache operations, but not -fetches-. Fetches are still
#	made from the original site, but stored with the store URL rewritten
#	URL as the store key.
#
#	For each requested URL rewriter will receive on line with the format
#
#	URL <SP> client_ip "/" fqdn <SP> user <SP> method <SP> urlgroup
#	 [<SP> kvpairs] <NL>
#
#	In the future, the rewriter interface will be extended with
#	key=value pairs ("kvpairs" shown above).  Rewriter programs
#	should be prepared to receive and possibly ignore additional
#	whitespace-separated tokens on each input line.
#
#	And the rewriter may return a rewritten URL. The other components of
#	the request line does not need to be returned (ignored if they are).
#
#	By default, a Store URL rewriter is not used.
#
#	Please note - the normal URL rewriter rewrites Squid's _destination_
#	URL - ie, what it fetches. The Store URL rewriter rewrites Squid's
#	_store_ URL - ie, what it uses to store and retrieve objects.
#
#Default:
# none

#  TAG: storeurl_rewrite_children
#
#
#Default:
# storeurl_rewrite_children 5

#  TAG: storeurl_rewrite_concurrency
#
#
#Default:
# storeurl_rewrite_concurrency 0

#  #       Specify the location of the executable for the URL rewriter.
#       Since they can perform almost any function there isn't one included.
#  TAG: url_rewrite_program
#	Specify the location of the executable for the URL rewriter.
#	Since they can perform almost any function there isn't one included.
#
#	For each requested URL rewriter will receive on line with the format
#
#	URL <SP> client_ip "/" fqdn <SP> user <SP> method <SP> urlgroup
#	 [<SP> kvpairs] <NL>
#
#	In the future, the rewriter interface will be extended with
#	key=value pairs ("kvpairs" shown above).  Rewriter programs
#	should be prepared to receive and possibly ignore additional
#	whitespace-separated tokens on each input line.
#
#	And the rewriter may return a rewritten URL. The other components of
#	the request line does not need to be returned (ignored if they are).
#
#	The rewriter can also indicate that a client-side redirect should
#	be performed to the new URL. This is done by prefixing the returned
#	URL with "301:" (moved permanently) or 302: (moved temporarily).
#
#	It can also return a "urlgroup" that can subsequently be matched
#	in cache_peer_access and similar ACL driven rules. An urlgroup is
#	returned by prefixing the returned URL with "!urlgroup!".
#
#	By default, a URL rewriter is not used.
#
#Default:
# none


#  TAG: url_rewrite_children
#	The number of redirector processes to spawn. If you start
#	too few Squid will have to wait for them to process a backlog of
#	URLs, slowing it down. If you start too many they will use RAM
#	and other system resources.
#
#Default:
# url_rewrite_children 5

#  TAG: url_rewrite_concurrency
#	The number of requests each redirector helper can handle in
#	parallel. Defaults to 0 which indicates the redirector
#	is a old-style single threaded redirector.
#
#	When this directive is set to a value >= 1 then the protocol
#	used to communicate with the helper is modified to include
#	a request ID in front of the request/response. The request
#	ID from the request must be echoed back with the response
#	to that request.
#
#Default:
# url_rewrite_concurrency 0

#  TAG: url_rewrite_host_header
#	By default Squid rewrites any Host: header in redirected
#	requests.  If you are running an accelerator this may
#	not be a wanted effect of a redirector.
#
#	WARNING: Entries are cached on the result of the URL rewriting
#	process, so be careful if you have domain-virtual hosts.
#
#Default:
# url_rewrite_host_header on

#  TAG: url_rewrite_access
#	If defined, this access list specifies which requests are
#	sent to the redirector processes.  By default all requests
#	are sent.
#
#Default:
# none

#  TAG: storeurl_access
#
#
#Default:
# none

#  TAG: redirector_bypass
#	When this is 'on', a request will not go through the
#	redirector if all redirectors are busy.  If this is 'off'
#	and the redirector queue grows too large, Squid will exit
#	with a FATAL error and ask you to increase the number of
#	redirectors.  You should only enable this if the redirectors
#	are not critical to your caching system.  If you use
#	redirectors for access control, and you enable this option,
#	users may have access to pages they should not
#	be allowed to request.
#
#Default:
# redirector_bypass off

#  TAG: location_rewrite_program
#	Specify the location of the executable for the Location rewriter,
#	used to rewrite server generated redirects. Usually used in
#	conjunction with a url_rewrite_program
#
#	For each Location header received the location rewriter will receive
#	one line with the format:
#
#	   location URL <SP> requested URL <SP> urlgroup <NL>
#
#	And the rewriter may return a rewritten Location URL or a blank line.
#	The other components of the request line does not need to be returned
#	(ignored if they are).
#
#	By default, a Location rewriter is not used.
#
#Default:
# none

#  TAG: location_rewrite_children
#	The number of location rewriting processes to spawn. If you start
#	too few Squid will have to wait for them to process a backlog of
#	URLs, slowing it down. If you start too many they will use RAM
#	and other system resources.
#
#Default:
# location_rewrite_children 5

#  TAG: location_rewrite_concurrency
#	The number of requests each Location rewriter helper can handle in
#	parallel. Defaults to 0 which indicates that the helper
#	is a old-style singlethreaded helper.
#
#Default:
# location_rewrite_concurrency 0


Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Re: Не работает связка SQUID+SAMS Rejik3 NTLM

Непрочитанное сообщение Sindikat88 » 2010-11-01 14:12:05

Заметил ещё особенность: когда кабель по которому приходит интернет вставлен в старый шлюз (192.168.1.1), и машина с FreeBSD загружена, то интернет отваливается почти на всех клиентских машинах

Аватара пользователя
Sindikat88
мл. сержант
Сообщения: 138
Зарегистрирован: 2010-09-02 15:07:54
Контактная информация:

Re: Не работает связка SQUID+SAMS Rejik3 NTLM

Непрочитанное сообщение Sindikat88 » 2010-11-01 23:22:20

Никто не сталкивался с такой проблемой?