-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 15/02/2015 9:26 a.m., Jason Haar wrote: > But this is just a hack around a problem isn't it? Yes. > ie why can't squid successfully intercept 20M+ transfers from this > website? Well, Squid *is* intercepting them. Its what happens after that is going wrong. > I guess it's working for 1byte-10M transactions, so why not 20M? Indeed. Lets look closer... > 1423851413.570 228 192.168.100.111 TAG_NONE/200 0 CONNECT > 217.69.141.150:443 - ORIGINAL_DST/217.69.141.150 - Squid receives a CONNECT, bumps it... > 1423851413.670 81 192.168.100.111 TCP_MISS/410 291 POST > https://jim24.mail.ru/helper? - ORIGINAL_DST/217.69.141.150 > text/html .. inside is a POST to "jim24.mail.ru:443" Squid delivers that to the server the CONNECT was going to (217.69.141.150:443). The server responds "410 Gone". A debug_options 11,2 trace might provide more insight. Amos -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQEcBAEBAgAGBQJU38IkAAoJELJo5wb/XPRjS4UIAOEMiMhYYhfdKR6RncP2dS8w SjpjPDcpBnGPBgrgfZDGqRna3wkq3m2VvsHfgez//c7hiRkSJ6tWZdIlZMIVvI/P cZ1x4DSUdsovfVNK/Yfs2Vc6oPjgkpBWrMAlNw3/TcNwHcn6PQCsj0xXxUdZ/Br6 jQ56WuL5FZA+dsIdbKQFwvuVfziwkcGwFfeBLmfEynbEjfV3H6fSe8t5lj5tbLnq 1qUvqdMtyGN4Nvji9T4hslRIgFoFBKs+lJVSSQD9Rqs8/bomukAcoj6H4XplMSZq zg+zxuMamZJrepM+URqgVxWR8fW+qQH173yq4eHjsTibpyJ5HpGhC+hSmQrCZjY= =MN2Y -----END PGP SIGNATURE----- _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users