Search squid archive

Re: SECURITY ALARM, once more

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 21/06/2016 9:44 p.m., reinerotto wrote:
>> stay in sync 
> naturally 90-something percent of the time. <
> I have a local dnsmasq running. squid and all clients synced to it.
> But the last 10% seem to cause the SECURITY ALERT.
> 
> 
> 2016/06/21 12:17:51.672 kid1| SECURITY ALERT: Host header forgery detected
> on local=nn.nnn.nnn.nnn:443 remote=10.1.0.126:62222 FD 199 flags=33 (local
> IP does not match any domain IP)
> 2016/06/21 12:17:51.672 kid1| SECURITY ALERT: on URL: ib.adnxs.com:443
> 
> In  case, this messages shows up, is the connection terminated ?
> 

The request continues to be handled same as any other. Except that it is
not cached and only allowed to go upstream to the same destination IP
address the client was trying to use (ORIGINAL_DST).

I'm not completely sure what happens to the SSL-Bump fake CONNECT
requests when the SNI value causes the alert. The fake request has the
above settings flagged, but the SSL-Bump logic may or may not follow
through for the decrypted requests. Those sub-requests should have the
validation check applied separately for their particular Host's anyway,
so maybe different results at that point.

Amos

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux