I need help to verify a pending patch for transparent interception on various platforms. I can only verify this on Linux myself.
If you run Squid as a transparent proxy on another platform than Linux, using one of the following configure options:
--enable-ipf-transparent (IP-Filter) --enable-pf-transparent (PF network translation)
then please help verifying that Squid-2.5.STABLE9 + the patch from Bug 1193 compiles cleanly, and that the original IP address discovery still works
Patch file:
http://www.squid-cache.org/bugs/attachment.cgi?id=583&action=view
How to apply to the Squid sources:
cd squid-2.5.STABLE9 wget -O- 'http://www.squid-cache.org/bugs/attachment.cgi?id=583&action=view' | patch -p0
Then build and install Squid as usual in transparently interception mode, but with a slight change in squid.conf:
httpd_accel_port 0
instead of the usual
httpd_accel_port 80
Note: http_port should be the default 3128, or at least not 80 for this test to be complete.
How to verify that IP address discovery and patch in general works proper:
From a client having port 80 traffic intercepted by the proxy execute
telnet www.squid-cache.org 80 GET / HTTP/1.0 [blank line]
Then verify that you get the Squid page back and that access.log contains a request for http://206.168.0.9/
Regards Henrik