Hi Everyone,I've searched and search but have not found an answer to my
question.I'm running CentOS 7 and Squid 3.3.4. When I insert "http_access
allow Safe_ports" AFTER "http_access allow authenticated_users" I have no
access to ports listed under my Safe_ports ACL, however when I put it before
th
This is kind of off-topic but on one of our deployments this crash is now
consistently deadlocking squid whenever it occurs rather than just ending the
process. Meaning that is can’t be restarted by any means except kill -9, which
obviously a huge disruption to hundreds of clients and incredibly
Thanks for the help!
In file client_side.h:
inline void setServerBump(Ssl::ServerBump *srvBump) {
if (!sslServerBump)
sslServerBump = srvBump;
else
assert(sslServerBump == srvBump);
}
Changed to:
inline void setServerBump(Ssl::ServerBump *srvB
On 24/02/2015 02:16, HackXBack wrote:
i did that with version 3.5.1
now wen upgrade again for 3.5.2 my cache damaged again !!
i just want to know how this version is stable !!
its full of bugs !!
Hey HackXBack,
Some would imagine that squid is perfect and if you will look at the
Bugzilla you
On 24/02/2015 00:53, HackXBack wrote:
there is a way without using ssl_bump
without forwarding https
but this will work with browsers and not with youtube mobile app.
its in header replace
Hey HackXBack,
I am not to familiar with all of the mobile apps but if the client needs
filtering he nee
i did that with version 3.5.1
now wen upgrade again for 3.5.2 my cache damaged again !!
i just want to know how this version is stable !!
its full of bugs !!
cache.log =
2015/02/23 19:20:51 kid1| Could not parse headers from on disk object
2015/02/23 19:20:51 kid1| BUG 3279: HTTP reply without Da
there is a way without using ssl_bump
without forwarding https
but this will work with browsers and not with youtube mobile app.
its in header replace
--
View this message in context:
http://squid-web-proxy-cache.1019090.n4.nabble.com/Need-tips-in-order-to-force-youtube-in-HTTP-only-tp4670014p4
I'm trying to POST large files (>1MB) through a squid 3.5.2 proxy set up to
intercept connections.
The client is including an 'Expect: 100-continue' header, and sends all headers
in a single network packet.
POSTs of content smaller than 1MB go through, but larger POSTs do not.
The client's TCP
Is there a way to build 3.5.1 without libcom_err?
On my old Redhat system (2.6.18-128.1.1.el5) I get compilation failures unless
I remove all references to libcom_err.
Here's a snippet from the config log:
configure:24277: checking for krb5.h
configure:24277: result: yes
configure:24277: checkin
So I got squid to intercept http and https traffic, but I get the
following error on any https access
2015/02/23 12:50:15 kid1| clientNegotiateSSL: Error negotiating SSL
connection o
n FD 28: error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown
ca (1/0
)
This of course leads to al
Hey Deniz,
Squid is an HTTP proxy and is built upon the idea of a "request" and a
"response".
Currently squid code allows and do couple things as the request starts.
The only option I can think of that can "do" what you need is ICAP or
ECAP which can inspect the traffic on the fly when it flow
Hi,
I have an authentication system that authenticates a connection after
10-20 packet flows and I want to integrate this authentication system
with squid using external_acl functionality. However when I inspected
squid, I realized that it asks external_acl tool only when connection
is being estab
12 matches
Mail list logo