Hi

We recently shifted to squid 5.9 and started seeing errors in Transparent mode

SECURITY ALERT: Host header forgery detected on conn3615903
local=44.242.184.237:443 remote=10.109.176.240:8990 FD 28029 flags=17
(local IP does not match any domain IP)

Previously we were using
https://github.com/NethServer/dev/issues/5348. In addition we are
using client_dst_passthru off. When building 5.9, the patch was not
applied cleanly and we wanted to check if things worked without this
patch. They did not work.

I did check the forum responses
https://wiki.squid-cache.org/KnowledgeBase/HostHeaderForgery. and
https://docs.diladele.com/faq/squid/host_header_forgery.html. We
already support explicit proxy but that is not always an option. We
can create another patch to circumvent issues like  in
https://github.com/NethServer/dev/issues/5348. But I wanted to know if
there is a plan to make this check optional or there is some way we
can workaround this problem without changing the code. Without this
support, how can intercept mode work for any website which is behind a
loadbalancer with multiple IPs.

Regards
Sachin
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to