Hey Ankor,

There is some missing context so I would be able to reproduce this issue.
Is this some kind of CONNECT request?

If you can describe in more technical details the setup and what client are you 
using,
Maybe couple sanitized log lines it would help to understand better the 
scenario.

Eliezer

From: squid-users <squid-users-boun...@lists.squid-cache.org> On Behalf Of 
Andrey K
Sent: Friday, June 9, 2023 10:03
To: Squid Users <squid-users@lists.squid-cache.org>; Amos Jeffries 
<squ...@treenet.co.nz>
Subject: [squid-users] Using tcp_outgoing_address with ACL

Hello, 

We use the tcp_outgoing_address feature to access some hosts using a dedicated 
source IP address.

   acl domdst_SIProxy  dstdomain 
"/data/squid.user/etc/squid/categories/domdst_SIProxy"
   tcp_outgoing_address 10.72.235.129 domdst_SIProxy

It works fine, but logs are flooded with warnings like this:
   2023/06/09 08:30:07 kid2| WARNING: domdst_SIProxy ACL is used in context 
without an HTTP request. Assuming mismatch.

I found a similar case: 
http://lists.squid-cache.org/pipermail/squid-users/2015-January/001629.html 
where Amos suggested using a patch as a solution.
We have Squid Version 5.5. Is there a similar patch for our version, or can we 
just ignore these messages?

Kind regards,
       Ankor.

_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to