Search squid archive

Re: Another "Forwarding loop detected" issue

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 05/11/2019 11:07, Nick Howitt wrote:


On 05/11/2019 10:44, Amos Jeffries wrote:
On 5/11/19 10:40 pm, Nick Howitt wrote:
I am trying to help someone who is running squid-3.5.20-12 on a
standalone server with the dansguardian content filter and suddenly
recently has been getting a lot of messages like:

    2019/10/31 13:48:14 kid1| WARNING: Forwarding loop detected for:
    HEAD / HTTP/1.0
    Via: 1.0 HSFilterHyperos7.haftr.local (squid/3.5.20)
    Cache-Control: max-age=259200
    Connection: keep-alive
    X-Forwarded-For: 10.10.1.2
    Host: 10.10.1.2:8080


The access log looks something like:

    1572545946.383 120000 10.10.1.2 TCP_MISS_ABORTED/000 0 HEAD
    http://10.10.1.2:8080/ - HIER_DIRECT/10.10.1.2 -
    1572545946.477 120000 10.10.1.2 TCP_MISS_ABORTED/000 0 HEAD
    http://10.10.1.2:8080/ - HIER_DIRECT/10.10.1.2 -
    1572545946.493 120000 10.10.1.2 TCP_MISS_ABORTED/000 0 HEAD
    http://10.10.1.2:8080/ - HIER_DIRECT/10.10.1.2 -

(but these are for different transactions - they are all the same apart
from the timestamps)

That is what a forwarding loop looks like in the access.log.


The content filter listens on port 8080 and squid on 3128. The machine
is on 10.10.1.2

All the other posts I've seen seem to be for transparent mode or where
there is a User Agent string. I have found nothing to cover this
scenario. How can I troubleshoot to fix it and what information do you
need from me to help diagnose?

Something is telling Squid the origin server being contacted exists at
10.10.1.2:8080. You can see that in the Host header of the message.

I would trace the traffic flow from the client to Squid.

But isn't everything coming to 8080 as that is the proxy you'd set up in the browser? I'm afraid I don't understand how proxying works at the packet level. I see nothing before these messages to indicate the packets are coming from elsewhere. A cut down startup log looks like:

   <snip>
   2019/10/31 13:47:40 kid1| helperOpenServers: Starting 5/5
   'ext_unix_group_acl' processes
   2019/10/31 13:47:40 kid1| HTCP Disabled.
   2019/10/31 13:47:40 kid1| Finished loading MIME types and icons.
   2019/10/31 13:47:40 kid1| Accepting HTTP Socket connections at
   local=[::1]:3128 remote=[::] FD 2021 flags=9
   2019/10/31 13:47:40 kid1| Accepting HTTP Socket connections at
   local=127.0.0.1:3128 remote=[::] FD 2022 flags=9
   2019/10/31 13:47:40 kid1| Accepting HTTP Socket connections at
   local=10.10.1.2:3128 remote=[::] FD 2023 flags=9
   2019/10/31 13:48:12 kid1| WARNING: Forwarding loop detected for:
   HEAD / HTTP/1.0
   Via: 1.0 HSFilterHyperos7.haftr.local (squid/3.5.20)
   Cache-Control: max-age=259200
   Connection: keep-alive
   X-Forwarded-For: 10.10.1.2
   Host: 10.10.1.2:8080


   2019/10/31 13:48:14 kid1| WARNING: Forwarding loop detected for:
   HEAD / HTTP/1.0
   Via: 1.0 HSFilterHyperos7.haftr.local (squid/3.5.20)
   Cache-Control: max-age=259200
   Connection: keep-alive
   X-Forwarded-For: 10.10.1.2
   Host: 10.10.1.2:8080


Is there anything I can look for in my logs or do I need to do some sort of tcpdump with some filters?

Thanks,

Nick
At the moment the wpad file is not pointing to the proxy server so no machines should be using it. I have tried a:

   tcpdump -vvvnnn -A -i eth0 port 8080 -s 1500


This gives me bursts of:

   07:50:47.569305 IP (tos 0x0, ttl 128, id 56718, offset 0, flags
   [DF], proto TCP (6), length 52)
        10.10.11.215.64857 > 10.10.1.2.8080: Flags [S], cksum 0x389b
   (correct), seq 625662051, win 64240, options [mss 1460,nop,wscale
   8,nop,nop,sackOK], length 0
   E..4..@....H

   ..

   ...Y..%J.c........8...............
   07:50:47.569419 IP (tos 0x0, ttl 64, id 7161, offset 0, flags [DF],
   proto TCP (6), length 40)
        10.10.1.2.8080 > 10.10.11.215.64857: Flags [R.], cksum 0x744b
   (correct), seq 0, ack 1, win 0, length 0
   E..(..@.@...

   ..

   .....Y....%J.dP...tK..


From what I've researched so far there are no http headers in these packets. The proxy is 10.10.1.2. Does this mean 10.10.11.215 could be the offending machine if no other machines should be using the proxy? Or do I need to do something cleverer with my tcpdump?

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux