E-mail do yhaoo
-
Boa noite, estou com problema na minha rede… os usuarios nao estao conseguindo acessa o email do yhaoo pelo proxy autenticado, mesmo sem nenhum bloqueio, acessa pagina inicial normalmente e quando acessa o email da como pagina nao pode ser exibida, e se tiro do proxy diretamente no modem, ja funciona perfeitamente.
-
Muda de navegador para no lugar de 'a pagina não pode ser exibida' você consegue ver e postar o erro de fato
-
Pois e Marcelo, testei no firefox, ie e chorme, e nada… e em varias maquinas. muito estranho.
Minha rede esta dessa forma:192.168.1.1 ate o 127 esta livre sem passar pelo proxy. (estes conesegue acessar o email sem problemas)
192.168.1.128/25 está passando pelo proxy autenticado. (estes fica carregando... e depois de um tempo da msg de nao pode ser exibida)portas 80 e 443 estao bloqueadas para a faixa 192.168.1.128/25
-
Olha os logs do squid, instala o firebug, roda o tcpdump…
-
Marcelo rodei o tcdump o ip da maquina e o 192.168.1.221
13:54:25.870704 IP 192.168.1.1.3128 > 192.168.1.221.1586: Flags [.], ack 2, win 513, length 0 13:54:25.870716 IP 192.168.1.221.1585 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.870818 IP 192.168.1.1.3128 > 192.168.1.221.1586: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:25.870855 IP 192.168.1.221.1587 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:25.870891 IP 192.168.1.1.3128 > 192.168.1.221.1587: Flags [.], ack 2, win 513, length 0 13:54:25.870903 IP 192.168.1.221.1586 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.870974 IP 192.168.1.1.3128 > 192.168.1.221.1587: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:25.871047 IP 192.168.1.221.1587 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.871164 IP 192.168.1.221.1590 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:25.871200 IP 192.168.1.1.3128 > 192.168.1.221.1590: Flags [.], ack 2, win 513, length 0 13:54:25.871261 IP 192.168.1.1.3128 > 192.168.1.221.1590: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:25.871279 IP 192.168.1.221.1591 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:25.871312 IP 192.168.1.1.3128 > 192.168.1.221.1591: Flags [.], ack 2, win 513, length 0 13:54:25.871332 IP 192.168.1.221.1590 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.871409 IP 192.168.1.1.3128 > 192.168.1.221.1591: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:25.871482 IP 192.168.1.221.1591 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.871547 IP 192.168.1.221.1593 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:25.871589 IP 192.168.1.1.3128 > 192.168.1.221.1593: Flags [.], ack 2, win 513, length 0 13:54:25.871650 IP 192.168.1.221.1594 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:25.871687 IP 192.168.1.1.3128 > 192.168.1.221.1594: Flags [.], ack 2, win 513, length 0 13:54:25.871740 IP 192.168.1.1.3128 > 192.168.1.221.1593: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:25.871815 IP 192.168.1.221.1593 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.871846 IP 192.168.1.1.3128 > 192.168.1.221.1594: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:25.871919 IP 192.168.1.221.1594 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:25.978047 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [.], ack 461, win 32538, length 0 13:54:25.978130 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.180219 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [.], ack 1921, win 32768, length 0 13:54:26.180304 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.180330 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.181164 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [.], ack 4841, win 32768, length 0 13:54:26.181205 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.181229 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.181252 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.181275 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.182041 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [.], ack 10681, win 32768, length 0 13:54:26.182075 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.182098 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.182120 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.182140 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 636, win 513, length 1460 13:54:26.182225 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [P.], ack 636, win 513, length 415 13:54:26.182884 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [.], ack 16936, win 32768, length 0 13:54:26.232264 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [F.], seq 636, ack 16936, win 32768, length 0 13:54:26.232305 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [.], ack 637, win 513, length 0 13:54:26.275165 IP 192.168.1.221.1604 > 192.168.1.1.3128: Flags [s], seq 2130579105, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0 13:54:26.275325 IP 192.168.1.1.3128 > 192.168.1.221.1604: Flags [S.], seq 1673757548, ack 2130579106, win 65228, options [mss 1460,nop,wscale 7,sackOK,eol], length 0 13:54:26.275430 IP 192.168.1.221.1604 > 192.168.1.1.3128: Flags [.], ack 1, win 32768, length 0 13:54:26.276690 IP 192.168.1.221.1604 > 192.168.1.1.3128: Flags [P.], ack 1, win 32768, length 752 13:54:26.276757 IP 192.168.1.1.3128 > 192.168.1.221.1604: Flags [.], ack 753, win 507, length 0 13:54:26.326849 IP 192.168.1.1.3128 > 192.168.1.221.1589: Flags [P.], ack 637, win 513, length 1400 13:54:26.328002 IP 192.168.1.221.1589 > 192.168.1.1.3128: Flags [R.], seq 637, ack 18336, win 0, length 0 13:54:26.917923 IP 192.168.1.1.3128 > 192.168.1.221.1604: Flags [P.], ack 753, win 513, length 637 13:54:26.918011 IP 192.168.1.1.3128 > 192.168.1.221.1604: Flags [P.], ack 753, win 513, length 76 13:54:26.918313 IP 192.168.1.1.3128 > 192.168.1.221.1604: Flags [F.], seq 714, ack 753, win 513, length 0 13:54:26.918508 IP 192.168.1.221.1604 > 192.168.1.1.3128: Flags [.], ack 715, win 32411, length 0 13:54:26.961222 IP 192.168.1.221.1604 > 192.168.1.1.3128: Flags [F.], seq 753, ack 715, win 32411, length 0 13:54:26.961266 IP 192.168.1.1.3128 > 192.168.1.221.1604: Flags [.], ack 754, win 513, length 0 13:54:26.972214 IP 192.168.1.221.1605 > 192.168.1.1.3128: Flags [s], seq 2208242857, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0 13:54:26.972359 IP 192.168.1.1.3128 > 192.168.1.221.1605: Flags [S.], seq 2120804323, ack 2208242858, win 65228, options [mss 1460,nop,wscale 7,sackOK,eol], length 0 13:54:26.972465 IP 192.168.1.221.1605 > 192.168.1.1.3128: Flags [.], ack 1, win 32768, length 0 13:54:26.973234 IP 192.168.1.221.1605 > 192.168.1.1.3128: Flags [P.], ack 1, win 32768, length 258 13:54:26.973291 IP 192.168.1.1.3128 > 192.168.1.221.1605: Flags [.], ack 259, win 511, length 0 13:54:35.834698 IP 192.168.1.221.1595 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:35.834766 IP 192.168.1.1.3128 > 192.168.1.221.1595: Flags [.], ack 2, win 513, length 0 13:54:35.834897 IP 192.168.1.1.3128 > 192.168.1.221.1595: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:35.834918 IP 192.168.1.221.1596 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:35.834955 IP 192.168.1.1.3128 > 192.168.1.221.1596: Flags [.], ack 2, win 513, length 0 13:54:35.834969 IP 192.168.1.221.1595 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:35.835131 IP 192.168.1.1.3128 > 192.168.1.221.1596: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:35.835156 IP 192.168.1.221.1597 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:35.835196 IP 192.168.1.1.3128 > 192.168.1.221.1597: Flags [.], ack 2, win 513, length 0 13:54:35.835210 IP 192.168.1.221.1596 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:35.835290 IP 192.168.1.1.3128 > 192.168.1.221.1597: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:35.835368 IP 192.168.1.221.1597 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:35.835454 IP 192.168.1.221.1598 > 192.168.1.1.3128: Flags [F.], seq 1, ack 1, win 32768, length 0 13:54:35.835496 IP 192.168.1.1.3128 > 192.168.1.221.1598: Flags [.], ack 2, win 513, length 0 13:54:35.835561 IP 192.168.1.1.3128 > 192.168.1.221.1598: Flags [F.], seq 1, ack 2, win 513, length 0 13:54:35.835639 IP 192.168.1.221.1598 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:54:56.926537 IP 192.168.1.221.1605 > 192.168.1.1.3128: Flags [F.], seq 259, ack 1, win 32768, length 0 13:54:56.926615 IP 192.168.1.1.3128 > 192.168.1.221.1605: Flags [.], ack 260, win 513, length 0 13:54:56.926950 IP 192.168.1.1.3128 > 192.168.1.221.1605: Flags [F.], seq 1, ack 260, win 513, length 0 13:54:56.927059 IP 192.168.1.221.1605 > 192.168.1.1.3128: Flags [.], ack 2, win 32768, length 0 13:55:09.414612 IP 192.168.1.221.1602 > 192.168.1.1.3128: Flags [.], ack 3775, win 32768, length 1 13:55:09.414681 IP 192.168.1.1.3128 > 192.168.1.221.1602: Flags [.], ack 474, win 513, length 0 13:55:09.854317 IP 192.168.1.221.1603 > 192.168.1.1.3128: Flags [.], ack 898, win 32319, length 1 13:55:09.854453 IP 192.168.1.1.3128 > 192.168.1.221.1603: Flags [.], ack 536, win 513, length 0 13:55:10.623733 IP 192.168.1.221.1592 > 192.168.1.1.3128: Flags [.], ack 1240, win 32148, length 1 13:55:10.623812 IP 192.168.1.1.3128 > 192.168.1.221.1592: Flags [.], ack 1339, win 513, length 0 13:55:54.701690 IP 192.168.1.221.1602 > 192.168.1.1.3128: Flags [.], ack 3775, win 32768, length 1 13:55:54.701770 IP 192.168.1.1.3128 > 192.168.1.221.1602: Flags [.], ack 474, win 513, length 0 13:55:55.031446 IP 192.168.1.221.1603 > 192.168.1.1.3128: Flags [.], ack 898, win 32319, length 1 13:55:55.031507 IP 192.168.1.1.3128 > 192.168.1.221.1603: Flags [.], ack 536, win 513, length 0 13:55:55.910801 IP 192.168.1.221.1592 > 192.168.1.1.3128: Flags [.], ack 1240, win 32148, length 1 13:55:55.910867 IP 192.168.1.1.3128 > 192.168.1.221.1592: Flags [.], ack 1339, win 513, length 0 [/s][/s]
-
acessei log do squid no exato momento da requisicao da usuaria tarsila
[2.0.1-RELEASE][root@arena.facmais]/root(4): tail -f /var/squid/logs/access.log 1334768988.563 507 192.168.1.221 TCP_MISS/200 546 GET http://tr.adinterax.com/tr/yahoo_latam%2Chome%2FBR_Renault%2F835989_041012_FPAD_takeover_Renault_BR%2CC%3DRenault_835989%2CP%3DY-Brazil%2CK%3D7733122/0.766155525110662/1523/ai.0/b.gif tarsila DIRECT/98.139.200.238 image/gif 1334768988.585 538 192.168.1.221 TCP_MISS/302 897 GET http://ia.nspmotion.com/tracking/? tarsila DIRECT/65.99.198.181 text/html 1334768988.609 552 192.168.1.221 TCP_MISS/302 897 GET http://ia.nspmotion.com/tracking/? tarsila DIRECT/65.99.198.181 text/html 1334768988.613 527 192.168.1.221 TCP_MISS/200 693 GET http://tr.adinterax.com/re/yahoo_latam%2Chome%2FBR_Renault%2F835989_041012_FPAD_takeover_Renault_BR%2CC%3DRenault_835989%2CP%3DY-Brazil%2CK%3D7733122/0.766155525110662/0/in%2Cti/ti.gif tarsila DIRECT/98.139.200.238 text/plain 1334768988.802 746 192.168.1.221 TCP_MISS/200 2824 GET http://l.yimg.com/cv/ip/ap/default/120417/vida_de_cao_latir.jpg tarsila DIRECT/216.115.98.240 image/jpeg 1334768989.117 1063 192.168.1.221 TCP_MISS/200 35836 GET http://mi.adinterax.com/customer/yahoo_latam/3/home/BR_Renault/.ob/Renault_Sandero_RipCurl_Waves_Yahoo_Intervencao_TakeOver_300x200.swf? tarsila DIRECT/8.27.230.253 application/x-shockwave-flash 1334768989.544 511 192.168.1.221 TCP_MISS/204 380 GET http://br.yahoo.com/p.gif;_ylp=A2KLtDdU9Y5PI0AB51yU7q5_? - DIRECT/209.191.122.70 text/plain 1334768994.202 594 192.168.1.221 TCP_MISS/302 713 GET http://mail.yahoo.com/;_ylt=AqKuVeF5qibUA80vepIQIjyU7q5_? - DIRECT/98.139.241.94 text/html 1334769024.202 29991 192.168.1.221 TCP_MISS/000 0 CONNECT login.yahoo.com:443 - NONE/- - 1334769024.778 506 192.168.1.221 TCP_MISS/200 546 GET http://tr.adinterax.com/tr/yahoo_latam%2Chome%2FBR_Renault%2F835989_041012_FPAD_takeover_Renault_BR%2CC%3DRenault_835989%2CP%3DY-Brazil%2CK%3D7733122/0.766155525110662/0/ei/1602/l0s.0%2Ci%3AFPAD.0/1757/l6s.0%2Ci%3Avisite%2520o%2520site.0/1763/l12s.0%2Ci%3Awallpaper.0/2304/l13s.0%2Ci%3Alateral%252desquerda.0/2720/l14s.0%2Ci%3Alateral%252ddireita.0/2969/l15s.0%2Ci%3Abt%252dfechar.0/1284/mt/41043/tt/b.gif tarsila DIRECT/98.139.200.238 image/gif 1334769069.212 509 192.168.1.221 TCP_MISS/200 693 GET http://tr.adinterax.com/re/yahoo_latam%2Chome%2FBR_Renault%2F835989_041012_FPAD_takeover_Renault_BR%2CC%3DRenault_835989%2CP%3DY-Brazil%2CK%3D7733122/0.2957122325897217/0/in%2Cti/ti.gif tarsila DIRECT/98.139.200.238 text/plain 1334769069.791 543 192.168.1.221 TCP_MISS/200 489 GET http://row.bc.yahoo.com/b? - DIRECT/98.139.240.22 image/gif 1334769070.325 507 192.168.1.221 TCP_MISS/200 546 GET http://tr.adinterax.com/tr/yahoo_latam%2Chome%2FBR_Renault%2F835989_041012_FPAD_takeover_Renault_BR%2CC%3DRenault_835989%2CP%3DY-Brazil%2CK%3D7733122/0.2957122325897217/1215/ai.0/b.gif tarsila DIRECT/98.139.200.238 image/gif 1334769072.085 1374 192.168.1.221 TCP_MISS/302 713 GET http://mail.yahoo.com/;_ylt=AqKuVeF5qibUA80vepIQIjyU7q5_? - DIRECT/98.139.241.94 text/html 1334769101.896 29802 192.168.1.221 TCP_MISS/000 0 CONNECT login.yahoo.com:443 - NONE/- - 1334769102.465 507 192.168.1.221 TCP_MISS/200 546 GET http://tr.adinterax.com/tr/yahoo_latam%2Chome%2FBR_Renault%2F835989_041012_FPAD_takeover_Renault_BR%2CC%3DRenault_835989%2CP%3DY-Brazil%2CK%3D7733122/0.2957122325897217/0/ei/1321/l0s.0%2Ci%3AFPAD.0/1369/l6s.0%2Ci%3Avisite%2520o%2520site.0/1373/l12s.0%2Ci%3Awallpaper.0/1751/l13s.0%2Ci%3Alateral%252desquerda.0/1767/l14s.0%2Ci%3Alateral%252ddireita.0/2116/l15s.0%2Ci%3Abt%252dfechar.0/33552/tt/b.gif tarsila DIRECT/98.139.200.238 image/gif