Search squid archive

Re: host header forgery false positives

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hey Jason,

I think we can divide the issue into two:
- host forgery identification
- host forgery action

And you can also add intercepting compared to configured forward proxy.
If you can draw a picture of the clients and the proxy network layout we can try somewhere. What you are talking about is mainly due to intercepting connections and not using a regular forward proxy. Also what dns server are you using there? Do you have queries log enabled?(like in bind) Can you run a "dig host" to verify what happens there? if there are many records in the response?

I have not used ssl-bump in intercept\trpoxy mode in a very long time but I would be happy to test couple things if it's easy enough.(1\2 routers + 1\2 clients win+lx)

Eliezer

On 12/01/2016 03:40, Jason Haar wrote:
This is a bit of a show-stopper to ever using bump: having perfectly
good websites being unavailable really isn't an option (in the case of
"peek-and-splice" over intercepted they seem to hang forever when this
error occurs). Perhaps an option to change it's behaviour would be
better? eg enable/disable and maybe "ignore client and use the IP
addresses squid thinks are best" could work?


Jason

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux