hall
> Sent: Wednesday, March 6, 2024 4:49 PM
> To: squid-users@lists.squid-cache.org
> Subject: [squid-users] Recommended squid settings when using IPS-based
> domain blocking
>
> Good morning,
>
> We have been using squid (version squid-5.5-6.el9_3.5) under RHEL9 as a
> simple p
Hey Jason,
I can try to build Squid 6.8 for RHEL 9, would this help you to test it as a
solution?
Eliezer
From: squid-users On Behalf Of
Jason Marshall
Sent: Wednesday, March 6, 2024 4:49 PM
To: squid-users@lists.squid-cache.org
Subject: [squid-users] Recommended squid settings when using
On 3/6/24 08:48, Jason Marshall wrote:
We have been using squid (version squid-5.5-6.el9_3.5) under RHEL9 as a
simple pass-through proxy without issue for the past month or so.
Recently our security team implemented an IPS product that intercepts
domain names known to be associated with
tell the team that is running the IPS to change their policy from DROP
to something else, so you are not a captive audience to the timeout.
By sending a RST, they can cause Squid to close the connection and
fail faster. if they are intercepting the DNS request, have them
leverage an RPZ and send
On 2024-03-06 09:48, Jason Marshall wrote:
We have been using squid (version squid-5.5-6.el9_3.5) under RHEL9 as a
simple pass-through proxy without issue for the past month or so.
Recently our security team implemented an IPS product that intercepts
domain names known to be associated with
Good morning,
We have been using squid (version squid-5.5-6.el9_3.5) under RHEL9 as a
simple pass-through proxy without issue for the past month or so. Recently
our security team implemented an IPS product that intercepts domain names
known to be associated with malware and ransomware command and