Witam...
Mam problem z dodaniem dodatkowego adresu IPv6 do Squid. Aktualnie Squid działa na 2 adresach IPv4:
acl ip1 myip 178.xx.x09.244
tcp_outgoing_address 178.xx.x09.244 ip1
acl ip2 myip 178.xx.x09.135
tcp_outgoing_address 178.xx.x09.135 ip2
## TEST IPv6 ###
acl ip3 myip 2xxx:2xx0:3:xx00::1xxx:afxx
tcp_outgoing_address 2xxx:2xx0:3:xx00::1xxx:afxx ip3
Gdy w przeglądarce opera ustawię adres IPv6 jako proxy(adres podaje w formie [adres_ipv6]), to w ogóle nie może się połączyć z serwerem proxy. Myślałem że może brama blokuje więc ją wyłączyłem(ip6tables i iptables) i nadal to samo. Próbowałem konfiguracji bramy pod IPv6 z adresu: http://www.cyberciti...-configuration/ i nadal to samo
Więc problem musi tkwić w konfiguracji Squida. Szukałem w google informacji ale o IPv6 są tylko tematy że squid nie może się połączyć ze stroną która stoi na IPv6, a żeby działał na IPv6 nie mogłem znaleźć nic ciekawego.
Reszta konfiguracji:
System: CentOS release 6.2 (Final)
Administrator hostingu dodał do mojego VPS klasę IPv6 i skonfigurował w systemie parę adresów.
[root@vps ~]# ifconfig
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
venet0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:127.0.0.1 P-t-P:127.0.0.1 Bcast:0.0.0.0 Mask:255.255.255.255
inet6 addr: <adres ip v6> Scope:Global
inet6 addr: <adres ip v6> Scope:Global
inet6 addr: <adres ip v6> Scope:Global
inet6 addr: <adres ip v6> Scope:Global
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
RX packets:7959 errors:0 dropped:0 overruns:0 frame:0
TX packets:8337 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1878744 (1.7 MiB) TX bytes:1940000 (1.8 MiB)
venet0:0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:178.xx.x09.244 P-t-P:178.xx.x09.244 Bcast:178.xx.x09.244 Mask:255.255.255.255
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
venet0:1 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:178.xx.x09.135 P-t-P:178.xx.x09.135 Bcast:178.xx.x09.135 Mask:255.255.255.255
UP BROADCAST POINTOPOINT RUNNING NOARP MTU:1500 Metric:1
Pełna konfiguracja Squid:
acl manager proto cache_object
acl localhost src 127.0.0.1/32 ::1
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32 ::1
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src 2001:4428:225::/48
acl localnet src fc00::/7 # RFC 4193 local private network range
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
acl to_ipv6 dst ipv6
http_access deny to_ipv6 !all
acl ip1 myip 178.xx.x09.244
tcp_outgoing_address 178.xx.x09.244 ip1
acl ip2 myip 178.xx.x09.135
tcp_outgoing_address 178.xx.x09.135 ip2
## TEST IPv6 ###
acl ip3 myip 2xxx:2xx0:3:xx00::1xxx:afxx
tcp_outgoing_address 2xxx:2xx0:3:xx00::1xxx:afxx ip3
acl SSL_ports port 443 563
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 563 # https, snews
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
# Squid normally listens to port 3128
http_port 3128
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager
# Deny requests to certain unsafe ports
http_access deny !Safe_ports
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#
# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet
http_access allow localhost
# And finally deny all other access to this proxy
# http_access allow all - Dostęp dla wszystkich
http_access deny all
# We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?
# Uncomment and adjust the following to add a disk cache directory.
#cache_dir ufs /var/spool/squid 100 16 256
# Leave coredumps in the first cache dir
coredump_dir /var/spool/squid
# Add any of your own refresh_pattern entries above these.
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern . 0 20% 4320
### WYŁĄCZENIE INFORMACJI O PROXY ###
via off
check_hostnames off
forwarded_for delete
### LOGI ####
error_directory /var/log/squid/error
access_log /var/log/squid/access.log squid
cache_log /var/log/squid/cache.log
cache_store_log /var/log/squid/store.log
####### Dodatkowe ustawienia #######
request_header_access Allow allow all
request_header_access Authorization allow all
request_header_access WWW-Authenticate allow all
request_header_access Proxy-Authorization allow all
request_header_access Proxy-Authenticate allow all
request_header_access Cache-Control allow all
request_header_access Content-Encoding allow all
request_header_access Content-Length allow all
request_header_access Content-Type allow all
request_header_access Date allow all
request_header_access Expires allow all
request_header_access Host allow all
request_header_access If-Modified-Since allow all
request_header_access Last-Modified allow all
request_header_access Location allow all
request_header_access Pragma allow all
request_header_access Accept allow all
request_header_access Accept-Charset allow all
request_header_access Accept-Encoding allow all
request_header_access Accept-Language allow all
request_header_access Content-Language allow all
request_header_access Mime-Version allow all
request_header_access Retry-After allow all
request_header_access Title allow all
request_header_access Connection allow all
request_header_access Proxy-Connection allow all
request_header_access User-Agent allow all
request_header_access Cookie allow all
Może ma ktoś jakiś pomysł co może blokować to lub jak to ustawić ?
Oczywiście nie muszę używać IPv4 mogę samego IPv6 zacząć używać tylko aby działał.
Dziękuję i pozdrawiam