Bloqueo de webs https ? help


Necesito bloquear https en el servidor proxy ? Aqui copio el script del iptables, quizas alguien pueda apoyarme con este tema ... gracias de antemano....

# tomado de

# Where to find iptables binary

# The network interface you will use
# WAN is the one connected to the internet
# LAN the one connected to your local network
WAN="eth0" # -> Speedy 1
LAN="eth1" # -> LAN
#WAN2="eth0" # -> Speedy 2


# First we need to clear up any existing firewall rules
# and chain which might have been created
$IPT -F -t mangle
$IPT -F -t nat

# Default policies: Drop any incoming packets
# accept the rest.

# To be able to forward traffic from your LAN
# to the Internet, we need to tell the kernel
# to allow ip forwarding

# echo 1 > /proc/sys/net/ipv4/ip_forward

#ivancp mod
sysctl -w net.ipv4.ip_forward=1

# Masquerading will make machines from the LAN
# look like if they were the router

#Redireccionamos solo el trafico de internet mediante Squid
$IPT -t nat -A PREROUTING -i $LAN -p tcp -m tcp --dport 80 -j DNAT --to-destination $SQUIDIP:$SQUIDPORT
$IPT -t nat -A PREROUTING -i $LAN -p tcp -m tcp --dport 80 -j REDIRECT --to-ports $SQUIDPORT

# If you want to allow traffic to specific port to be
# forwarded to a machine from your LAN
# here we forward traffic to an HTTP server to machine
#$IPT -t nat -A PREROUTING -i $WAN -p tcp --dport 80 -j DNAT --to
#$IPT -A FORWARD -i $WAN -p tcp --dport 80 -m state --state NEW -j ACCEPT

# For a whole range of port, use:
#$IPT -t nat -A PREROUTING -i $WAN -p tcp --dport 1200:1300 -j DNAT --to
#$IPT -A FORWARD -i $WAN -p tcp --dport 1200:1300 -m state --state NEW -j ACCEPT

# Do not allow new or invalid connections to reach your internal network
$IPT -A FORWARD -i $WAN -m state --state NEW,INVALID -j DROP

# Accept any connections from the local machine
# plus from your local network

# Here we define a new chain which is going to handle
# packets we don't want to respond to
# limit the amount of logs to 10/min
$IPT -N Firewall
$IPT -A Firewall -m limit --limit 10/minute -j LOG --log-prefix "Firewall: "
$IPT -A Firewall -j DROP

# log those packets and inform the sender that the packet was rejected
$IPT -N Rejectwall
$IPT -A Rejectwall -m limit --limit 10/minute -j LOG --log-prefix "Rejectwall: "
$IPT -A Rejectwall -j REJECT

# use the following instead if you want to simulate that the host is not reachable
# for fun though
#$IPT -A Rejectwall -j REJECT --reject-with icmp-host-unreachable

# here we create a chain to deal with unlegitimate packets
# and limit the number of alerts to 10/min
# packets will be drop without informing the sender
$IPT -N Badflags
$IPT -A Badflags -m limit --limit 10/minute -j LOG --log-prefix "Badflags: "
$IPT -A Badflags -j DROP

# A list of well known combination of Bad TCP flags
# we redirect those to the Badflags chain
# which is going to handle them (log and drop)
$IPT -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ACK,PSH PSH -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ACK,URG URG -j Badflags
$IPT -A INPUT -p tcp --tcp-flags FIN,RST FIN,RST -j Badflags
$IPT -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j Badflags
$IPT -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ALL ALL -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ALL NONE -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ALL FIN,PSH,URG -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ALL SYN,FIN,PSH,URG -j Badflags
$IPT -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j Badflags

# Accept certain icmp message, drop the others
# and log them through the Firewall chain
# 0 => echo reply
$IPT -A INPUT -p icmp --icmp-type 0 -j ACCEPT
# 3 => Destination Unreachable
$IPT -A INPUT -p icmp --icmp-type 3 -j ACCEPT
# 11 => Time Exceeded
$IPT -A INPUT -p icmp --icmp-type 11 -j ACCEPT
# 8 => Echo
# avoid ping flood
$IPT -A INPUT -p icmp --icmp-type 8 -m limit --limit 1/second -j ACCEPT
$IPT -A INPUT -p icmp -j Firewall

# Accept ssh connections from the Internet
$IPT -A INPUT -i $WAN -p tcp --dport 22 -j ACCEPT

# Accept FTP connections from the Internet
$IPT -A INPUT -i $WAN -p tcp --dport 21 -j ACCEPT

# Accept HTTP connections from the Internet
$IPT -A INPUT -i $WAN -p tcp --dport 80 -j ACCEPT

# or only accept from a certain ip
#$IPT -A INPUT -i $WAN -s -p tcp --dport 22 -j ACCEPT

# Accept related and established connections

# Drop netbios from the outside, no log, just drop
$IPT -A INPUT -p udp --sport 137 --dport 137 -j DROP

# Finally, anything which was not allowed yet
# is going to go through our Rejectwall rule
$IPT -A INPUT -j Rejectwall