Search squid archive

Re: problem with upload

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



sorry for forgetting to mention squid version it's 3.1.11
the POST access.logs (for sample making a grep for only POST requests) are
1337667519.252    822 192.168.12.100 TCP_MISS/200 2122 POST http://ocsp.verisign.com/ - DIRECT/199.7.57.72 application/ocsp-response
1337667534.962    505 192.168.12.100 TCP_MISS/200 1078 POST http://ocsp.usertrust.com/ - DIRECT/178.255.83.1 application/ocsp-response
1337667536.532   1440 192.168.12.100 TCP_MISS/200 2331 POST http://ocsp.entrust.net/ - DIRECT/216.191.247.139 application/ocsp-response
1337670608.843    996 192.168.12.100 TCP_MISS/200 6683 POST http://us.mc1256.mail.yahoo.com/mc/compose? - DIRECT/66.196.66.156 text/html
1337670695.523    675 192.168.12.100 TCP_MISS/200 982 POST http://ocsp.digicert.com/ - DIRECT/69.36.162.242 application/ocsp-response
1337670696.642    597 192.168.12.100 TCP_MISS/200 982 POST http://ocsp.digicert.com/ - DIRECT/69.36.162.242 application/ocsp-response
1337670696.915    556 192.168.12.100 TCP_MISS/200 982 POST http://ocsp.digicert.com/ - DIRECT/69.36.162.242 application/ocsp-response
1337670809.875    460 192.168.12.100 TCP_MISS/200 995 POST http://arabia.msn.com/GeneralMethod.aspx/GetWeather - DIRECT/41.178.51.12 application/json
1337670817.995    782 192.168.12.100 TCP_MISS/200 2164 POST http://ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670818.160    955 192.168.12.100 TCP_MISS/200 2164 POST http://ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670825.073    655 192.168.12.100 TCP_MISS/200 982 POST http://ocsp.digicert.com/ - DIRECT/69.36.162.242 application/ocsp-response
1337670828.705   3573 192.168.12.100 TCP_MISS/200 982 POST http://ocsp.digicert.com/ - DIRECT/69.36.162.242 application/ocsp-response
1337670830.291   1028 192.168.12.100 TCP_MISS/200 2295 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670830.291    830 192.168.12.100 TCP_MISS/200 2295 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670830.901    493 192.168.12.100 TCP_MISS/200 2295 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670830.925    484 192.168.12.100 TCP_MISS/200 2295 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670831.044    479 192.168.12.100 TCP_MISS/200 2434 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670831.538    485 192.168.12.100 TCP_MISS/200 2434 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670831.568    484 192.168.12.100 TCP_MISS/200 2434 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670831.649    483 192.168.12.100 TCP_MISS/200 2434 POST http://evsecure-ocsp.verisign.com/ - DIRECT/199.7.52.72 application/ocsp-response
1337670884.703    525 192.168.12.100 TCP_MISS/200 788 POST http://www.4shared.com/javascriptRedirect.jsp - DIRECT/74.117.178.89 text/html
1337670930.970    636 192.168.12.100 TCP_MISS/200 581 POST http://www.4shared.com/rest/sharedFileUpload/create? - DIRECT/74.117.178.89 application/json
1337671057.835 124619 192.168.12.100 TCP_MISS/000 0 POST http://dc588.4shared.com/main/upload5.jsp? - DIRECT/204.155.149.57 -
1337671097.683 468715 192.168.12.100 TCP_MISS/502 1470 POST http://ne1.attach.mail.yahoo.com/us.f1256.mail.yahoo.com/ya/upload? - DIRECT/98.138.79.63 text/html
1337671201.785    745 192.168.12.100 TCP_MISS/200 367 POST http://www.4shared.com/rest/sharedFileUpload/error - DIRECT/74.117.178.89 application/json
1337671368.951 166333 192.168.12.100 TCP_MISS/000 0 POST http://dc588.4shared.com/main/upload5.jsp? - DIRECT/204.155.149.57 -
1337671420.455    656 192.168.12.100 TCP_MISS/200 1032 POST http://stats.avg.com/services/toolbar_updater.aspx - DIRECT/23.45.247.117 text/xml
1337671435.492    367 192.168.12.100 TCP_MISS/302 584 POST http://stats.avg.com/Services/ssf.asmx/GetFile - DIRECT/23.45.247.117 -

please if the rule 
> > acl my_network src 192.168.12.0/24
> > http_access allow my_network
is removed how can i allow this ip to enter the squid cacheserver.
i read that /000 mean the connection is aborted, the connection is aborted when the upload is down, 
i will add the "http_access deny all"
thanks with my best regards 

--- On Mon, 5/21/12, Amos Jeffries <squid3@xxxxxxxxxxxxx> wrote:

> From: Amos Jeffries <squid3@xxxxxxxxxxxxx>
> Subject: Re:  problem with upload
> To: squid-users@xxxxxxxxxxxxxxx
> Date: Monday, May 21, 2012, 11:57 PM
> On 22.05.2012 06:18, Mustafa Raji
> wrote:
> > hi
> > i have squid cache server configured in the intercept
> mode. i have a
> > problem when i upload to websites, some time i can
> upload normally and
> > other time when i upload a file to the internet the
> uploading process
> > does not complete and the upload reduced to 0 kB
> > please can any one help me. is there any way that squid
> effects on
> > uploading data. the configuration file is
> 
> No Squid does not affect the upload data. It is relayed as
> received.
> 
> You will need to identify the difference between POST/PUT
> requests which are succeeding and those which are failing.
> This may require a TCP packet trace from between the clients
> and Squid (use "tcpdump -s 0 ..." to get all the headers).
>  I suspect you will find the HTTP/1.1 Expect feature being
> sent in the failing requests (no body data gets sent until
> after a timeout or 100 / 417 message exchange).
> 
> Please also identify which Squid release number you are
> using.
> 
> 
> > 
> > acl my_network src 192.168.12.0/24
> > http_access allow my_network
> > 
> 
> The above rule should really be down ... ---->
> 
> > #squid default acl configuration
> > acl manager proto cache_object
> > acl localhost src 127.0.0.1/32
> > acl to_localhost dst 127.0.0.0/8
> > acl Safe_ports port 80
> > acl Safe_ports port 21
> > acl Safe_ports port 443
> > acl Safe_ports port 70
> > acl Safe_ports port 210
> > acl Safe_ports port 1025-65535
> > acl Safe_ports port 280
> > acl Safe_ports port 488
> > acl Safe_ports port 591
> > acl Safe_ports port 777
> > acl SSL_ports port 443 563
> > 
> > acl CONNECT method CONNECT
> > http_access deny !Safe_ports
> > http_access deny CONNECT !SSL_ports
> > http_access allow manager localhost
> > http_access deny manager !localhost
> 
> 
>   ---> ... here. Below the security protection rules
> that prevent network attacks.
> 
> NOTE: Having the last rule in your config a "deny ..." rule
> means anything not already blocked is allowed.
>   You should finish the http_access rules with
> "http_access deny all"
> 
> > 
> > http_port 3128 intercept
> > http_port 8181
> > 
> > client_persistent_connections off
> > server_persistent_connections off
> > cache_effective_user proxy
> > coredump_dir /var/coredump
> > 
> > #define cache replacement policy
> > memory_replacement_policy heap GDSF
> > cache_replacement_policy heap LFUDA
> 
> Amos
> 



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux