Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-11-24 Thread Dan Charlesworth
They’re probably matching about 40% of the time on twitter.com, though 😒 > On 25 Nov 2015, at 11:40 AM, Dan Charlesworth wrote: > > Alright, thanks for the hint. > > My proxy and clients definitely have the same DNS server (I removed the > secondary and tertiary ones to make totally sure) but

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-11-24 Thread Dan Charlesworth
Alright, thanks for the hint. My proxy and clients definitely have the same DNS server (I removed the secondary and tertiary ones to make totally sure) but the results definitely aren’t matching 99% of the time. Probably more like 90%. Perhaps it’s 'cause my clients are caching records locally

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-11-24 Thread Amos Jeffries
On 25/11/2015 12:20 p.m., Dan Charlesworth wrote: > Thanks for the perspective on this, folks. > > Going back to the technical stuff—and this isn’t really a squid thing—but is > there any way I can minimise this using my DNS server? > > Can I force my local DNS to only ever return 1 address fro

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-11-24 Thread Dan Charlesworth
Thanks for the perspective on this, folks. Going back to the technical stuff—and this isn’t really a squid thing—but is there any way I can minimise this using my DNS server? Can I force my local DNS to only ever return 1 address from the pool on a hostname I’m having trouble with? > On 30 Oc

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-29 Thread Alex Rousskov
On 10/29/2015 11:29 AM, Matus UHLAR - fantomas wrote: >> On 10/28/2015 10:46 PM, Amos Jeffries wrote: >>> NP: these problems do not exist for forward proxies. Only for traffic >>> hijacking interceptor proxies. > > On 29.10.15 09:05, Alex Rousskov wrote: >> For intercepted connections, Squid shoul

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-29 Thread Matus UHLAR - fantomas
On 10/28/2015 10:46 PM, Amos Jeffries wrote: NP: these problems do not exist for forward proxies. Only for traffic hijacking interceptor proxies. On 29.10.15 09:05, Alex Rousskov wrote: For intercepted connections, Squid should, with an admin permission, connect to the intended IP address with

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-29 Thread Alex Rousskov
On 10/28/2015 10:46 PM, Amos Jeffries wrote: > NP: these problems do not exist for forward proxies. Only for traffic > hijacking interceptor proxies. For intercepted connections, Squid should, with an admin permission, connect to the intended IP address without validating whether that IP address

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-29 Thread Dan Charlesworth
This is happening when my client and proxy are using the same DNS server. In this case, a local OS X Server which forwards to my ISP’s DNS servers. As far as I can tell Google’s DNS isn’t in the equation any more. Even so, if I run a `dig watch` on the domain, it happily cycles through a pool of

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-29 Thread Amos Jeffries
On 29/10/2015 1:16 p.m., Dan Charlesworth wrote: > It looks like there’s certain hosts that are designed to load balance (or > something) between a few IPs, regardless of geography. > > For example pbs.twimg.com resolves to wildcard.twimg.com which returns two > different IPs each time, from a p

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-28 Thread Dan Charlesworth
It looks like there’s certain hosts that are designed to load balance (or something) between a few IPs, regardless of geography. For example pbs.twimg.com resolves to wildcard.twimg.com which returns two different IPs each time, from a pool of 5–6, at random. Basically rolling the dice whether

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-22 Thread Yuri Voinov
22.10.15 15:58, Amos Jeffries пишет: On 21/10/2015 4:53 p.m., Dan Charlesworth wrote: I’m getting these very frequently for api.github.com and github.com I’m using the same DNS servers as my intercepting squid 3.5.10 proxy and they only return the one IP when I do an nslookup as well … Any

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-22 Thread Dan Charlesworth
Ah-ha. Thanks for digging into that a bit Amos. In my case 8.8.8.8 is the tertiary server, so I’m surprised it’s being used at all. Could be a local DNS server is forwarding to it, though. I’ll remove that from the equation tomorrow and see how it fares. Cheers > On 22 Oct 2015, at 8:58 PM, Am

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-22 Thread Amos Jeffries
On 21/10/2015 4:53 p.m., Dan Charlesworth wrote: > I’m getting these very frequently for api.github.com and github.com > > I’m using the same DNS servers as my intercepting squid 3.5.10 proxy and they > only return the one IP when I do an nslookup as well … > > Any updates from your end, Roel?

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-20 Thread Dan Charlesworth
I’m getting these very frequently for api.github.com and github.com I’m using the same DNS servers as my intercepting squid 3.5.10 proxy and they only return the one IP when I do an nslookup as well … Any updates from your end, Roel? > On 8 Oct 2015, at 8:29 PM, Eliezer Croitoru wrote: > > Si

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-08 Thread Eliezer Croitoru
Since they are using the same dns server there is no need to run some trials. The only test you should in any case test is to see how long is the IP list from the DNS request for the domain name. Eliezer On 08/10/2015 12:12, Roel van Meer wrote: Eliezer Croitoru writes: Are the users and pr

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-08 Thread Roel van Meer
Eliezer Croitoru writes: Are the users and proxy using different dns server? No, they are using the same server. Can you run dig from the proxy on this domain and dump the content to verify that the ip is indeed there? I'm currently running with 3.5.8 again, so I'll have to find a quiet h

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-08 Thread Eliezer Croitoru
Hey, Are the users and proxy using different dns server? Can you run dig from the proxy on this domain and dump the content to verify that the ip is indeed there? Eliezer On 06/10/2015 14:55, Roel van Meer wrote: Hi everyone, I have a Squid setup on a linux box with transparent interception

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-08 Thread Amos Jeffries
On 8/10/2015 6:41 p.m., Dan Charlesworth wrote: > Same here—I've been meaning to ask the list about this too. I’m still on > 3.5.9, by the way. > >> On 6 Oct 2015, at 10:55 PM, Roel van Meer wrote: >> >> Hi everyone, >> >> I have a Squid setup on a linux box with transparent interception of both

Re: [squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-07 Thread Dan Charlesworth
Same here—I've been meaning to ask the list about this too. I’m still on 3.5.9, by the way. > On 6 Oct 2015, at 10:55 PM, Roel van Meer wrote: > > Hi everyone, > > I have a Squid setup on a linux box with transparent interception of both > http and https traffic. Everything worked fine with S

[squid-users] Host header forgery detected after upgrade from 3.5.8 to 3.5.9

2015-10-06 Thread Roel van Meer
Hi everyone, I have a Squid setup on a linux box with transparent interception of both http and https traffic. Everything worked fine with Squid 3.5.6. After upgrading to version 3.5.10, I get many warnings about host header forgery: SECURITY ALERT: Host header forgery detected on local=10