On 7/03/2013 7:22 p.m., Amm wrote:
- Original Message -
From: Amos Jeffries
On 7/03/2013 5:30 p.m., Amm wrote:
- Original Message -
From: Amos Jeffries
On 7/03/2013 2:03 a.m., Amm wrote:
I just tried 443 port interception with sslbump and is working
perfectly.
Hi, everyone!
Last week, we start our plan to migrate all of our application server to the
virtualization group. We use Squid as our cache system, we want to use xen as
the host and use debian PV as guest.
And the hardware info below:
CPU : Intel(R) Xeon(R) CPU E5506 @ 2.13GHz X 2
- Original Message -
> From: Amos Jeffries
> To: squid-users@squid-cache.org
> Cc:
> Sent: Thursday, 7 March 2013 11:19 AM
> Subject: Re: [squid-users] Bypassing SSL Bump for dstdomain
>
> On 7/03/2013 5:30 p.m., Amm wrote:
>> - Original Message -
>>> From: Amos Jeffries
>>>
On 7/03/2013 5:30 p.m., Amm wrote:
- Original Message -
From: Amos Jeffries
On 7/03/2013 2:03 a.m., Amm wrote:
I just tried 443 port interception with sslbump and is working perfectly.
If sslbump none applies for request then it passes requests as is:
Log shows something like th
Hi folks,
Are there are any known memory leaks in Squid 3.2.7?
I'm running a configuration involving ntlm auth, and I've noticed in
particular that AVG smashes Squid when it can't authenticate - this
has caused Squid to consume all the available memory and eventually
crash.
I've reproduced this
- Original Message -
> From: Amos Jeffries
> To: squid-users@squid-cache.org
> Cc:
> Sent: Thursday, 7 March 2013 4:11 AM
> Subject: Re: [squid-users] Bypassing SSL Bump for dstdomain
>
> On 7/03/2013 2:03 a.m., Amm wrote:
>>>
>> I just tried 443 port interception with sslbump and
On 7/03/2013 2:03 a.m., Amm wrote:
- Original Message -
From: Amos Jeffries
On 6/03/2013 1:40 p.m., Alex Rousskov wrote:
On 03/05/2013 03:09 AM, Amos Jeffries wrote:
Squid tunnel functionality requires a CONNECT wrapper to generate
outgoing connections.
It is not yet setup t
On 23.01.13 05:12, Amos Jeffries wrote:
IIRC we tried that but it resulted in early cloure of CONNECT tunnels
and a few other bad side effects on the tunnelled traffic.
Due to the way tunnel.cc and client_side.cc code interacts (badly) the
client-side code cannot know whether the tunnel is still
Guys
I've been trying to build a solution using Squid in Centos, but
there is something missing. the WCCPV2 service is adquired by the
router, but after a while it stop redirecting the request, so I guest
there is something missing at the gre config, could you send me a good
example how t
Hallo, Amos,
Du meintest am 02.03.13:
> The Squid HTTP Proxy team is very pleased to announce the
> availability of the Squid-3.3.2 release!
Compiling it on one of my machines stopped with
depbase=`echo peer_proxy_negotiate_auth.o | sed 's|[^/]*$|.deps/
&|;s|\.o$||'`;\
g++ -DHAVE_CONFIG_H -DDE
On 03/06/2013 06:15 AM, Amm wrote:
>> On 03/04/2013 10:11 PM, Amm wrote:
>>
# Let user specify domains to avoid decrypting, such as internet
>> banking
acl bump-bypass dstdomain .commbank.com.au
ssl_bump none bump-bypass
ssl_bump server-first all
>>
>>
>>> This will
- Original Message -
> From: Amos Jeffries
> To: squid-users@squid-cache.org
> Cc:
> Sent: Wednesday, 6 March 2013 11:36 AM
> Subject: Re: [squid-users] Bypassing SSL Bump for dstdomain
>
> On 6/03/2013 1:40 p.m., Alex Rousskov wrote:
>> On 03/05/2013 03:09 AM, Amos Jeffries wrote:
On 6/03/2013 8:20 p.m., jiluspo wrote:
http://www.squid-cache.org/Doc/config/udp_incoming_address/ was been buggy
and been around in ubuntu bug report.
udp_incoming_address doesn't work.
The only bug I see in Ubuntu about that directive is that it causes DNS
packets to go to the address confi
13 matches
Mail list logo