Re: [squid-users] Refresh pattern issue in squid 3.1.20

2015-12-27 Thread Amos Jeffries
On 28/12/2015 5:30 p.m., SaRaVanAn wrote: > Thanks for prompt response. > > I want to match all the URL's which has a pattern of "wsj" (example: *. > wsj.com, *.wsj.net, *.wsj.edu ) . Does wildcard makes sense in squid > refresh pattern? Can we have something like this? > > refresh_pattern -i ^h

Re: [squid-users] Refresh pattern issue in squid 3.1.20

2015-12-27 Thread Eliezer Croitoru
Hey, The pattern you wrote is wrong and also doesn't describe your need\desire. A domain name can contain only certain characters so using a "." is wrong. Also url and domain regular expressions should be as strict as possible so you would not have false positive matches. Amos suggested to use

Re: [squid-users] Refresh pattern issue in squid 3.1.20

2015-12-27 Thread SaRaVanAn
Thanks for prompt response. I want to match all the URL's which has a pattern of "wsj" (example: *. wsj.com, *.wsj.net, *.wsj.edu ) . Does wildcard makes sense in squid refresh pattern? Can we have something like this? refresh_pattern -i ^http://*\.wsj\.*/ 10 200% 10 \ override-expire reload

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Jason Haar
On 28/12/15 14:34, Amos Jeffries wrote: > Removing the redirect of tcp/443 totally fixes the problem. > > What redirect ? tcp/443 redirect - sorry bad choice of words (really iptables REDIRECT). ie TOR starts working if it isn't going through squid (which I appreciate doesn't add much to this conv

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Amos Jeffries
On 28/12/2015 11:13 a.m., Jason Haar wrote: > Hi there > > I use TOR a bit for testing our WAFs and found that it no longer worked > on my test network that has squid configured in TLS intercept mode. I > currently have squid configured to "splice only" (with peek to get the > SNI name) - ie no bu

Re: [squid-users] Refresh pattern issue in squid 3.1.20

2015-12-27 Thread Amos Jeffries
On 28/12/2015 1:30 p.m., SaRaVanAn wrote: > Hi, > We are using squid 3.1.20 in our box. We are facing issues on configuring > and validating the refresh patterns. It looks like squid is not honoring > the refresh patterns properly. > > > *configuration* > *refresh_pattern -i ^http://.wsj./.* 10 2

[squid-users] Refresh pattern issue in squid 3.1.20

2015-12-27 Thread SaRaVanAn
.js - NONE/- application/javascript 1451261742.341 51 172.19.131.180 TCP_HIT/200 65486 GET http://m.wsj.net/video/20151227/122715storms/122715storms_960x540.jpg - NONE/- image/jpeg 1451261742.428132 172.19.131.180 TCP_HIT/200 53668 GET http://m.wsj.net/video/20151223/121415barpilots/121415barpilots_9

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Alex Rousskov
On 12/27/2015 03:13 PM, Jason Haar wrote: > Surely if all you are doing is > splice-only, it shouldn't be doing that check at all? The situation is not that black-and-white, unfortunately. This general problem can be viewed under several different angles: A. You are not using a splice-only confi

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 wpad.dat&proxy.pac? 28.12.15 4:57, Jason Haar пишет: > On 28/12/15 11:50, Yuri Voinov wrote: >> I think, to eliminate this error you need to splice all torify connections. > As I said - squid is configured to *only* splice - there is no bump-ing

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 So, you can't get this error. Ergo, it may be client configuration problem. Is there is transparent proxy? 28.12.15 4:57, Jason Haar пишет: > On 28/12/15 11:50, Yuri Voinov wrote: >> I think, to eliminate this error you need to splice all torify

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Jason Haar
On 28/12/15 11:50, Yuri Voinov wrote: > I think, to eliminate this error you need to splice all torify connections. As I said - squid is configured to *only* splice - there is no bump-ing going on. So this is already the case acl DiscoverSNIHost at_step SslBump1 ssl_bump peek DiscoverSNIHost acl

Re: [squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I think, to eliminate this error you need to splice all torify connections. I.e., you need to configure your squid something like this: # SSL bump rules acl step1 at_step SslBump1 ssl_bump peek step1 acl Splice ssl::server_name_regex -i "/usr/loc

[squid-users] Host header forgery affects pure splice environment too?

2015-12-27 Thread Jason Haar
Hi there I use TOR a bit for testing our WAFs and found that it no longer worked on my test network that has squid configured in TLS intercept mode. I currently have squid configured to "splice only" (with peek to get the SNI name) - ie no bumping - purely so that the squid access_log file contain