On 01/11/17 05:53, Alex Rousskov wrote:
On 10/31/2017 02:51 AM, Amos Jeffries wrote:
That operational state (HTTP underway) also means RFC 7230 is the
relevant place to look for behaviour requirements. Section 6.3.1 says:
A proxy MUST NOT automatically retry non-idempotent requests.
So
On 10/31/2017 02:51 AM, Amos Jeffries wrote:
> That operational state (HTTP underway) also means RFC 7230 is the
> relevant place to look for behaviour requirements. Section 6.3.1 says:
> A proxy MUST NOT automatically retry non-idempotent requests.
> So it depends entirely on what type of HTTP
On 31/10/17 05:22, Alex Rousskov wrote:
On 10/30/2017 03:51 AM, Troiano Alessio wrote:
I've squid 3.5.20 running on RHEL 7.4. I have a problem to access
some websites, for example www.nato.int. This website apply an
Anti-DDoS system that reset the first connection after the TCP 3-way
handshake
It's regarding active fingerprinting and mitigating attacks, not just it's
passive use. (Sorry for the dbl send)
On Oct 30, 2017 21:41, "Alex Rousskov"
wrote:
> On 10/30/2017 12:15 PM, Andrei wrote:
> > You do realize that there's nothing "weird" about p0f, right?
>
> Right. I do not know why yo
On 10/30/2017 12:15 PM, Andrei wrote:
> You do realize that there's nothing "weird" about p0f, right?
Right. I do not know why you had to ask though: There is nothing related
to p0f (i.e., a passive traffic analysis tool) in my response. And the
original question is probably unrelated to p0f as we
You do realize that there's nothing "weird" about p0f, right? Perhaps you
should have a read over:
http://lcamtuf.coredump.cx/p0f3/
https://blog.cloudflare.com/introducing-the-p0f-bpf-compiler/
On Mon, Oct 30, 2017 at 11:22 AM, Alex Rousskov <
rouss...@measurement-factory.com> wrote:
> On 10/30
On 10/30/2017 03:51 AM, Troiano Alessio wrote:
> I've squid 3.5.20 running on RHEL 7.4. I have a problem to access
> some websites, for example www.nato.int. This website apply an
> Anti-DDoS system that reset the first connection after the TCP 3-way
> handshake (SYN/SYN-ACK/ACK/RST-ACK). All subs
Hello,
I've squid 3.5.20 running on RHEL 7.4.
I have a problem to access some websites, for example www.nato.int.
This website apply an Anti-DDoS system that reset the first connection after
the TCP 3-way handshake (SYN/SYN-ACK/ACK/RST-ACK). All subsequent TCP
connections are accepted. The websit