That's how outgoing teamviewer connections look like in my log:
1358927965.305 90252 141.42.xxx.69 TCP_MISS/200 2711 CONNECT download.teamviewer.com:443 - HIER_DIRECT/46.163.100.220 -
1358928992.439 74 141.42.xxx.115 TCP_MISS/200 9 CONNECT ping3.teamviewer.com:443 - HIER_DIRECT/95.211.37.197 -
1358928994.050 66 141.42.xxx.115 TCP_MISS/200 112 CONNECT master11.teamviewer.com:443 - HIER_DIRECT/178.77.120.100 -
1358929846.641 210 141.42.xxx.214 TCP_MISS/200 9 CONNECT ping3.teamviewer.com:443 - HIER_DIRECT/108.59.5.129 -
How can I block those? Does url_regex still apply to CONNECT requests?
Idea:
acl teamviewer-ssl url_regex ^(master|ping)[0-9]+\.teamviewer\.com
http_access deny teamviewer-ssl
-- Ralf Hildebrandt Charite Universitätsmedizin Berlin ralf.hildebrandt_at_charite.de Campus Benjamin Franklin http://www.charite.de Hindenburgdamm 30, 12203 Berlin Geschäftsbereich IT, Abt. Netzwerk fon: +49-30-450.570.155Received on Wed Jan 23 2013 - 12:37:14 MST
This archive was generated by hypermail 2.2.0 : Wed Jan 23 2013 - 12:00:05 MST