Search squid archive

Host header forgery policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all,

After an upgrade of squid3 to version 3.3.8-1ubuntu6, I got the
unpleasant surprise of what is called the "Host header forgery
policy".

I've read the documentation of this part, and although I understand
the motivation of its implementation, I honestly see not very
practical implementing this without the possibility of disabling it,
basically because not all scenarios fit the requirements written on
the documentation.

I have about 30 clients and I've configured squid3 to be a transparent
proxy on port 3128 on a remote server. The entry point is port 8080
which is then redirected on the same host to the port 3128.

However, *any* opened URL throws the warning:

2014/07/14 19:21:52.612| SECURITY ALERT: Host header forgery detected
on local=10.10.0.1:8080 remote=10.10.0.6:59150 FD 9 flags=33 (local IP
does not match any domain IP)
2014/07/14 19:21:52.612| SECURITY ALERT: By user agent: Mozilla/5.0
(Windows NT 6.1; WOW64; rv:30.0) Gecko/20100101 Firefox/30.0
2014/07/14 19:21:52.612| SECURITY ALERT: on URL: google.com:443
2014/07/14 19:21:52.612| abandoning local=10.10.0.1:8080
remote=10.10.0.6:59150 FD 9 flags=33

I have manually configured the browser of these clients - the problem
is that in the company's network I have my DNS servers and on the
remote host (where the Squid server is running) there are others, and
as this is hosted by an external company which doesn't allow changing
those DNS nameservers, I wonder what to do? Is there any solution at
this point?

Thanks.




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux