LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Networking (https://www.linuxquestions.org/questions/linux-networking-3/)
-   -   unable to block https in squid (https://www.linuxquestions.org/questions/linux-networking-3/unable-to-block-https-in-squid-750621/)

Net_Spy 08-27-2009 08:10 AM

unable to block https in squid
 
Greetings to All,
I want setup acl that will prevent access to limited websites but having issue to with https:// I tried https://facebook.com it opened that same gmail or orkut. here is my acl

Code:

##Clients those are allowed to surf
acl myclnts src  "/home/scripts/ncc.squid"
acl alwurl url_regex -i "/home/scripts/alwurl"
## Following rule will allow only those site which are allowed for ncc.squid
http_access allow alwurl myclnts
http_access deny  test
http_access deny myclnts
deny_info ERR_NCC myclnts

Looking forward for your kind response.

Regards
Net_Spy

evilted 08-27-2009 08:28 AM

yes you need to block https...

acl secure proto https
http_access deny securehttp

anomie 08-27-2009 11:21 AM

@Net_spy: Are you trying to deny access to all https or just a few select hosts over https?

Net_Spy 08-27-2009 11:33 AM

Thanks for you response but it does not work for me I can still access to https://www.facebook.com or such other website . well I want to block such website like facebook , orkut , gmail these are the website that opens with https aswell .


Regards
Net_Spy

anomie 08-27-2009 12:00 PM

Something like this might do:

Code:

acl CONNECT method CONNECT

acl httpsfail dst www.facebook.com
acl httpsfail dst www.orkut.com

http_access deny httpsfail CONNECT

Denying access to specific https sites gets a little tricky.

Keep in mind that in the access control entries I posted above, dst will tell squid to resolve the hostnames to IP addresses at parse time. This means that if e.g. facebook or orkut should change IP info, squid will not know about the change.

-------

edit: I was just doing some experimenting -- see if this works as well:

Code:

acl CONNECT method CONNECT

acl httpsfail dstdomain .facebook.com
acl httpsfail dstdomain .orkut.com

http_access deny httpsfail CONNECT

Using dstdomain would be better, since it would additionally block https:/foo.facebook.com for example.

Net_Spy 08-27-2009 12:36 PM

well that does not work too have checked that rule by yourself , hope it will be resolved soon.


Regards
Net_Spy

anomie 08-27-2009 12:42 PM

I tested both options with squid 3.0.STABLE18, and both worked OK.

Post the acl-related entries from your squid.conf here. (Use code tags, please.)

win32sux 08-27-2009 02:31 PM

Net_Spy, using dstdomain works for domains accessed with either HTTP or HTTPS. You should make sure you don't have some other ACL granting access. It's hard for us to tell what's going on since we don't have a complete view of the relevant section of your squid.conf. Also, keep in mind that stuff like this won't work for HTTPS:
Quote:

Originally Posted by Net_Spy (Post 3659438)
acl alwurl url_regex -i "/home/scripts/alwurl"

Squid doesn't see the URL when using HTTPS (only the host name and port number).

Net_Spy 08-27-2009 04:03 PM

Following are the only acls that im using beside that ive safe port acl and virusport ssl thats it. Ive changed url_regex to dstdomain. but still same
I dont know what is wrong should.

Code:


######################################################
# Always direct and don't cached local destinations ##
######################################################
acl directdsts dst 10.0.0.0/255.0.0.0
always_direct allow directdsts
no_cache deny directdsts



###########################################
#  ACL Rules To Allow/Block
#  Websites
###########################################
acl myclnts src  "/home/scripts/ncc.squid"
acl flr-mgr src  "/home/scripts/flr-mgr"
acl alwurl dstdomain "/home/scripts/alwurl"
## Following rule will allow only those site which are allowed for ncc.squid
http_access allow alwurl myclnts
http_access deny myclnts
deny_info ERR_NCC myclnts
http_access allow flr-mgr <== allow access to supervisors
#acl webaccess1 url_regex  .google.com .yahoo.com
#acl youtube1 url_regex -i youtube facebook # This pattern wil be applied for all clients
#http_access deny youtube1 ## This rule will block youtube for all clients
#http_access deny all

Code:

acl SSL_ports port  443 8443 563 8383 2095
acl Safe_ports port 2095                # http
acl Safe_ports port 80          # http
acl Safe_ports port 82          # http
acl Safe_ports port 4000        # chatpk
acl Safe_ports port 81          # http
acl Safe_ports port 21          # ftp
acl Safe_ports port 20          # ftp
acl Safe_ports port 8443        # https
acl Safe_ports port 443 563    # https, snews
acl Safe_ports port 70          # gopher
acl Safe_ports port 210        # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280        # http-mgmt
acl Safe_ports port 488        # gss-http
acl Safe_ports port 591        # filemaker
acl Safe_ports port 777        # multiling http
acl CONNECT method CONNECT
acl VirusPorts port 69 135 137 138 139 153 707 445 9996 5554 4444 27374 31337 1214 6346 4444 10008 65535 12345 27374 31335-31337 5556 9996 8866 3127-3198 995-997 8998 1434


http_access deny VirusPorts
http_access allow manager localhost
http_access allow manager
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
#http_access allow adminclients



http_access deny VirusPorts
http_access allow manager localhost
http_access allow manager
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
#http_access allow adminclients


# And finally deny all other access to this proxy
http_access deny all

# http_reply_access allow all
http_reply_access allow all

Any idea ?

Regards
Net_Spy

anomie 08-27-2009 04:22 PM

I don't see any of our suggestions in your squid.conf.

Net_Spy 08-27-2009 06:00 PM

anomie I've tried that suggestions aswell but it didnt work for me it is my
acl part in my squid.conf./


[CODE]

###########################################
# ACL Rules To Allow/Block
# Websites
###########################################
acl myclnts src "/home/scripts/ncc.squid"
acl flr-mgr src "/home/scripts/flr-mgr"
acl alwurl dstdomain "/home/scripts/alwurl"
acl CONNECT method CONNECT

acl httpsfail dstdomain .facebook.com
acl httpsfail dstdomain .orkut.com


## Following rule will allow only those site which are allowed for ncc.squid
http_access allow alwurl myclnts
http_access deny myclnts
deny_info ERR_NCC myclnts
http_access allow flr-mgr <== allow access to supervisors
http_access deny httpsfail
http_access deny CONNECT
#acl webaccess1 url_regex .google.com .yahoo.com
#acl youtube1 url_regex -i youtube facebook # This pattern wil be applied for all clients
#http_access deny youtube1 ## This rule will block youtube for all clients
#http_access deny all


[CODE]
Regards
Net_Spy

anomie 08-27-2009 06:03 PM

Try like this instead:
Code:

###########################################
# ACL Rules To Allow/Block
# Websites
###########################################
acl myclnts src "/home/scripts/ncc.squid"
acl flr-mgr src "/home/scripts/flr-mgr"
acl alwurl dstdomain "/home/scripts/alwurl"
acl CONNECT method CONNECT

# Following three lines added by friends at LQ
acl httpsfail dstdomain .facebook.com
acl httpsfail dstdomain .orkut.com
http_access deny httpsfail CONNECT

## Following rule will allow only those site which are allowed for ncc.squid
http_access allow alwurl myclnts
http_access deny myclnts
deny_info ERR_NCC myclnts
http_access allow flr-mgr <== allow access to supervisors
#acl webaccess1 url_regex .google.com .yahoo.com
#acl youtube1 url_regex -i youtube facebook # This pattern wil be applied for all clients
#http_access deny youtube1 ## This rule will block youtube for all clients
#http_access deny all


win32sux 08-27-2009 06:21 PM

Quote:

Originally Posted by anomie (Post 3660105)
# Following three lines added by friends at LQ
acl httpsfail dstdomain .facebook.com
acl httpsfail dstdomain .orkut.com
http_access deny httpsfail CONNECT

I'm curious as to why you're explicitly denying the CONNECT method. That would imply that you actually do want to allow HTTP, wouldn't it? Something like this would take care of both HTTP and HTTPS:
Code:

acl totalfail dstdomain .facebook.com
acl totalfail dstdomain .orkut.com
http_access deny totalfail


Net_Spy 08-27-2009 07:23 PM

Ive tried that aswell but still I can access to it . using https://www.facebook.com or gmail or orkut. my squid version is 2.6 .

Regards
Net_Spy

win32sux 08-27-2009 07:32 PM

You did stick those lines at the top of your file, right? Because otherwise, we'd still have doubts about another ACL granting access. Also, is this Squid running in transparent mode? If so, verify that the clients are configured to use Squid for HTTPS. I've seen many cases in which administrators forgot that only HTTP gets transparently proxied, while HTTPS would be getting SNATed if not filtered. BTW, what does the log file look like when you access, say, Facebook?

Net_Spy 08-27-2009 08:23 PM

well onething ive noticed that when accessing https://www.facebook.com I didnt see its log in squid seems like it is bypassing squid although ive tried iptables -A FORWARD -p tcp --dport 433 -d www.facebook.com -j DROP nothing worked ?

Regards
Net_Spy

anomie 08-27-2009 08:43 PM

Quote:

Originally Posted by win32sux
I'm curious as to why you're explicitly denying the CONNECT method. That would imply that you actually do want to allow HTTP, wouldn't it?

That's right. I took OP's initial post to mean that he wanted to deny https only for those hosts.

I just re-read it, and I'm not 100% sure what he wants.

@Net_spy: Apologies if I've misunderstood. Can you clarify in straightforward English?

win32sux 08-28-2009 07:04 AM

Quote:

Originally Posted by Net_Spy (Post 3660205)
well onething ive noticed that when accessing https://www.facebook.com I didnt see its log in squid seems like it is bypassing squid

Okay, that would explain everything.

Quote:

although ive tried iptables -A FORWARD -p tcp --dport 433 -d www.facebook.com -j DROP nothing worked ?
That wouldn't work if a rule above was sending the packet to ACCEPT (use -I instead of -A to make sure that isn't the case). Also, with iptables it's usually a really bad idea to use host names, since the the IP will be resolved only once (while there could be several different IPs and/or they could change rapidly). Also, it's port 443, not 433. This should do the trick:
Code:

iptables -I FORWARD -p TCP --dport 443 -j REJECT
Then you'd need to configure the clients to use your Squid for HTTPS.

Net_Spy 08-28-2009 07:34 AM

yeah now you got it , well I think using iptables would be a bad idea .it will be fine to let squid to filter that. could you please tell me how do I configure squid to use https ?

Regards
Net_Spy

win32sux 08-28-2009 08:02 AM

Quote:

Originally Posted by Net_Spy (Post 3660711)
yeah now you got it , well I think using iptables would be a bad idea .it will be fine to let squid to filter that. could you please tell me how do I configure squid to use https ?

Your Squid looks like it's already set for HTTPS (443/TCP), look at the SSL_ports ACL. So now just tell/configure your clients to use Squid for HTTPS (443/TCP). The iptables command I gave you prevents them from bypassing Squid for that.

EDIT: You could also simply disable forwarding entirely, so you can rest assured they won't bypass Squid for anything at all. This assumes, of course, that the Squid box is also functioning as the router for the LAN.

evilted 08-28-2009 10:07 AM

Quote:

Originally Posted by Net_Spy (Post 3660205)
well onething ive noticed that when accessing https://www.facebook.com I didnt see its log in squid seems like it is bypassing squid although ive tried iptables -A FORWARD -p tcp --dport 433 -d www.facebook.com -j DROP nothing worked ?

Regards
Net_Spy

it wont drop it, https is port 443 and not port 433...

if you want to test a complete drop of https:
Code:

iptables -A FORWARD -m tcp -p tcp --dport 443 -j DROP

when you
Code:

iptables -L
you should see 'https' appear beside the rule you are dropping packets on
Code:

Chain FORWARD (policy ACCEPT)
target    prot opt source              destination
DROP      tcp  --  anywhere            anywhere            tcp dpt:https


then you can log, and make sure port 443 is being dropped..
Code:

iptables -A INPUT -j LOGDROP
which will appear in /var/log/messages

Net_Spy 08-28-2009 03:01 PM

Thank you all for your valuable responses.

I don't want to block https for all I just want to block certain websites.
blocking 443 via iptables will block all access and nobody will make connections to thier webmail or such other important things.

Regards
Net_Spy

win32sux 08-28-2009 04:36 PM

Quote:

Originally Posted by Net_Spy (Post 3661256)
I don't want to block https for all I just want to block certain websites.
blocking 443 via iptables will block all access and nobody will make connections to thier webmail or such other important things.

No, you're misunderstanding the purpose of the iptables command. The idea is that you use iptables to prevent the forwarding of all 443/TCP packets (alternatively, you could simply disable forwarding entirely). What that does is it prevents people from bypassing Squid like they currently seem to be doing. Since they would be forced to use Squid for their HTTPS sites, you could easily ban specific sites by means of the dstdomain ACL type which we've been trying to get working for you.

Net_Spy 08-28-2009 06:32 PM

I still did not get it .
Quote:

you use iptables to prevent the forwarding of all 443/TCP packets (alternatively, you could simply disable forwarding entirely).
Quote:

Since they would be forced to use Squid for their HTTPS sites,
Here is the iptables rule for redirecting 80 request to squid and masqurading

Code:

##INTSUB contains my network ranges
$IPTABLES -t nat -A PREROUTING -s $INTSUB -p tcp -m multiport -d ! www.paccs.com.pk --dports 80 -j REDIRECT --to-port 8080
$IPTABLES -t nat -A POSTROUTING -s $INTSUB -o $EXTDEV -j MASQUERADE

how to get iptables to work around to stop forward port 443 , and then squid will handle that traffic.

Regards
Net_Spy

win32sux 08-28-2009 07:11 PM

Quote:

Originally Posted by Net_Spy (Post 3661417)
how to get iptables to work around to stop forward port 443 , and then squid will handle that traffic.

Like this:
Code:

iptables -I FORWARD -p TCP --dport 443 -j DROP
Then configure your clients to use Squid for HTTPS.

Net_Spy 08-28-2009 08:28 PM

I wonder if you list me the running example here is my new acl but it doesnt seem to be work. and apply that iptbales rule but it block all requests.

Code:

acl SSL_ports port  443 8443 563 8383 2095 2092
acl myclnts src  "/home/scripts/ncc.squid" <== myclnt limited clints
acl flr-mgr src  "/home/scripts/flr-mgr" <== surevisor clients
acl alwurl dstdomain "/home/scripts/alwurl" <== url that are allow 4 clnts
acl blk dstdomain .facebook.com .gmail.com >== want to block 4 myclnts
## Following rule will allow only those site which are allowed for ncc.squid
http_access allow alwurl myclnts SSL_ports

http_access deny myclnts blk
deny_info ERR_NCC myclnts
http_access allow flr-mgr
http_access deny !flr-mgr

Regards
Net_Spy

win32sux 08-28-2009 08:57 PM

Quote:

Originally Posted by Net_Spy (Post 3661484)
and apply that iptbales rule but it block all requests.

That confirms that your clients aren't configured to use Squid for HTTPS.

Net_Spy 08-29-2009 07:01 AM

Now how do i configure my clients to use ssl via squid since I've already discussed that how my squid is being configured. Looking forward for your kind response.

Regards
Net_Spy

win32sux 08-29-2009 07:07 AM

Quote:

Originally Posted by Net_Spy (Post 3661859)
Now how do i configure my clients to use ssl via squid since I've already discussed that how my squid is being configured. Looking forward for your kind response.

It depends on what program and/or operating system we are talking about. For example, if it's Mozilla Firefox 3.0.x on GNU/Linux, you would click on Edit -> Preferences -> Advanced -> Network -> Settings -> Manual Proxy Configuration. Then you type in the IP address and port number which Squid is using. If you can't do this manually because you have too many clients then you'll need to use something like WPAD to automate things.

Net_Spy 08-29-2009 08:27 AM

my o/s is cent os 5.3 .Im using squid in tranparent mode I don't need to specify it is alread auto discovery . I'm finding really hard to block few https based website with squid .

Regards
Net_Spy

win32sux 08-29-2009 08:28 AM

Quote:

Originally Posted by Net_Spy (Post 3661916)
Im using squid in tranparent mode

Transparent mode doesn't apply to HTTPS.

You already confirmed to us that your clients are NOT using Squid for HTTPS when you posted this:
Quote:

Originally Posted by Net_Spy (Post 3660205)
when accessing https://www.facebook.com I didnt see its log in squid seems like it is bypassing squid

Quote:

Originally Posted by Net_Spy (Post 3661484)
and apply that iptbales rule but it block all requests.


Net_Spy 08-29-2009 08:13 PM

Thank you all for your support to helping me on this issue. since I fingure out ,it is not possible to track https in transparent mode of squid .


Regards
Net_Spy

win32sux 08-29-2009 08:53 PM

Quote:

Originally Posted by Net_Spy (Post 3662407)
Thank you all for your support to helping me on this issue. since I fingure out ,it is not possible to track https in transparent mode of squid .

For the record, it's not just Squid. This is a natural limitation of all proxy servers. Did you search LQ before starting this thread? I ask because this has been discussed here before. That said, the words "not possible" might be a bit too much, since you could always start issuing your own certificates (and get clients to accept them) in order to gain the ability to transparently proxy HTTPS traffic (MITM attack). It's a nasty/dangerous practice, but it seems to be an increasingly common one in corporate environments. Personally, I've never done it (and have no plans to), since it isn't compatible with my ethical standards.

Net_Spy 08-30-2009 06:09 PM

Thanks win32sux well I'm not going to do that , it isn't a good idea :) . well If I found any reliable solution I will add it in this thread .

Regards
Net_Spy

helmikuu 11-24-2010 02:21 PM

In my case, I been blocking facebook.com in pfsense server through squid. Although it is working perfectly , some users have found a way out by accessing the same url with https in place of http. To solve the problem I need to block https www.facebook.com in firewall rules.

Please click my simple tutorial on how to block https www.facebook.com

Net_Spy 11-29-2010 04:57 AM

Thanks for your valueable response. This is very old thread . One thing I would like to share is that there is not a way to block https via squid when you are running it in transparent mode . if your proxy isnt in transparent mode then there is easy to go with :) .

Regards
Net_Spy

chickenjoy 11-29-2010 06:01 AM

@Net_Spy

Tested this on squid 2.6STABLE on centos 5.5 and although I don't get the usual error message of 'access denied' like when accessing http://www.facebook.com.

when I access https://www.facebook.com; it shows a "proxy server refused connection" which also indirectly does what I want it to do....

did yours show similar behavior?

EDIT: whops; my squid was NOT in transparent mode. that is why. ^^

Net_Spy 12-01-2010 04:22 AM

Finally Ive solved my issue Im able to block https as well as streaming on facebook if it is allow :) . Im running squid in transparent mode so I had to use IPtables to block facebook completely :D.

If any one needs the solution let me know.

Regards
Net_Spy

kaustuva 01-14-2012 12:17 PM

Urgent Help
 
Quote:

Originally Posted by Net_Spy (Post 4176803)
Finally Ive solved my issue Im able to block https as well as streaming on facebook if it is allow :) . Im running squid in transparent mode so I had to use IPtables to block facebook completely :D.

If any one needs the solution let me know.

Regards
Net_Spy

Hi Net_Spy,

I am hopeless to block https traffic with some exception to allow some banking site.
I have blocked https traffic with iptables. I am using squid dansguardian.
Please suggest me, how you can block it.
Please replay me on my personal mail id: kaustuvabedant@gmail.com

Thanks and regards
Kaustuva

Jambaz 02-15-2012 04:21 AM

Quote:

Originally Posted by kaustuva (Post 4574497)
Hi Net_Spy,

I am hopeless to block https traffic with some exception to allow some banking site.
I have blocked https traffic with iptables. I am using squid dansguardian.
Please suggest me, how you can block it.
Please replay me on my personal mail id: kaustuvabedant@gmail.com

Thanks and regards
Kaustuva



Hi Kaustuva ,
I also need to resolve this problem , i use squid in transparent mode..i have read about iptables , you have resolved your problems ?

P.S.:If anyone have found the solution contact me at gibbybia@hotmail.com ( sorry for the e-mail )

Net_Spy 02-22-2012 01:24 AM

@Jambaz ,

This is very old thread , but yet I'm glad that it is useful to people who seeks the solution to block https :) . I will get back to you with solution. if you provide some details.


Retards
Net_Spy

Jambaz 02-23-2012 02:04 PM

Quote:

Originally Posted by Net_Spy (Post 4608932)
@Jambaz ,

This is very old thread , but yet I'm glad that it is useful to people who seeks the solution to block https :) . I will get back to you with solution. if you provide some details.


Retards
Net_Spy



Hi Net_Spy , me and Kaustuva are very happy to read your words :),
I tell you all you need , i use squid in transparent mode , the version is the 2.7stable 9 ( on Ubuntu ) with squidGuard , the https if i put the settings in the browser the https don't function , but you know that is not a solution , first because the user can set the settings manually ( especially on Win client , edit some key ) , second because they can use some programs like ultrasurf and they resolve https links.....i can denied all https connections , but i need that for banking and other utilietis and so i need only to apply the filter on this connection , or redirecting the https on http...tell me my friend Net_Spy the solution that you have found :-)

Regards

TB0ne 02-23-2012 02:56 PM

Quote:

Originally Posted by Jambaz (Post 4602792)
Hi Kaustuva ,
I also need to resolve this problem , i use squid in transparent mode..i have read about iptables , you have resolved your problems ?
P.S.:If anyone have found the solution contact me at ( sorry for the e-mail )

...and....
Quote:

Originally Posted by kaustuva
I am hopeless to block https traffic with some exception to allow some banking site. I have blocked https traffic with iptables. I am using squid dansguardian. Please suggest me, how you can block it. Please replay me on my personal mail id

You both re-opened a thread that was closed for TWO YEARS, and which was originally older than that, which isn't a good thing to do; post your own thread for your own questions. Second, this isn't the place to come for personalized, one-on-one email tech support. This is a COMMUNITY forum...if you don't participate here, then you need to PAY someone to spoon-feed you the answers to your email or give them to you over the phone.

As net_spy was told in this thread (and the OTHER thread opened with the same question), there are ways to perform some functions with https, but again you need to THINK about what https IS, and why a proxy server won't work for it. The suggestions in this thread are valid...follow them.

May want to read the UPDATED thread: http://www.linuxquestions.org/questi...curity-930878/

hhhrrrzzzzzzzzz 01-18-2016 11:24 AM

Hey i use "SQUID 2.7.STABLE8" under windows for several reasons.
the Domain Blocking from the example here work.

But how to block an SSL URL? like:
Code:

acl badsites url_regex -i ^%%%%%%%%%/.*/opener.*.mp4
That blocks an Ads Video who is played before the Clip come.
thanks!!!


(sorry i have to please the url with %)

TB0ne 01-18-2016 12:05 PM

Quote:

Originally Posted by hhhrrrzzzzzzzzz (Post 5480367)
Hey i use "SQUID 2.7.STABLE8" under windows for several reasons.
the Domain Blocking from the example here work.

But how to block an SSL URL? like:
Code:

acl badsites url_regex -i ^%%%%%%%%%/.*/opener.*.mp4
That blocks an Ads Video who is played before the Clip come.
thanks!!!

(sorry i have to please the url with %)

Read the LQ Rules...you have re-opened a THREE YEAR OLD THREAD, to post your own question...which was closed for TWO YEARS before the last couple of folks re-opened it.

They both *CLAIM* to have a 'solution', but (not surprisingly), haven't ever posted it, because it doesn't exist. Check the previous responses/links in this very thread, for why this won't work.

giftson 02-15-2017 06:23 AM

now a days gmail chat worked on the following urls (update on 2/15/2017)

clients6.google.com
hangouts.google.com

its work for me

Thank you

TB0ne 02-15-2017 07:45 AM

Quote:

Originally Posted by giftson (Post 5670848)
now a days gmail chat worked on the following urls (update on 2/15/2017)

clients6.google.com
hangouts.google.com

its work for me

Thank you

No idea what you're saying...your post makes no sense, and you re-opened this thread. What, exactly, does your post have to do with blocking https with squid???

ankurdixit82 05-23-2021 09:12 AM

Need solution to block https sites
 
Quote:

Originally Posted by Net_Spy (Post 3663240)
Thanks win32sux well I'm not going to do that , it isn't a good idea :) . well If I found any reliable solution I will add it in this thread .

Regards
Net_Spy

Hi,

You said, you found reliable solution. I am in urgent need of solution. Please let me know how you fixed and provide the solution.

regards,
Ankit

TB0ne 05-25-2021 10:03 AM

Quote:

Originally Posted by ankurdixit82 (Post 6253211)
Hi,
You said, you found reliable solution. I am in urgent need of solution. Please let me know how you fixed and provide the solution.

Read the LQ Rules. You re-opened a thread that had been closed for FIVE YEARS, and was originally opened NINE years ago. If you are in 'urgent need', then why haven't you bothered to read this entire thread, where solutions/advice were posted in post #2??

If you want to block https, then you can use iptables or any firewall to do it. There are abundant sets of documentation on how to do this, including links in this thread...have you looked at any of them? Beyond that, you have given us NO DETAILS about your system(s)/environment at all, and we aren't able to guess. Open your own thread for your own question, and when doing so, provide full details, including showing what you've done/tried so far.


All times are GMT -5. The time now is 12:10 PM.