I need help to verify a pending patch for transparent interception on various platforms. I can only verify this on Linux myself.

If you run Squid as a transparent proxy on another platform than Linux, using one of the following configure options:

   --enable-ipf-transparent     (IP-Filter)
   --enable-pf-transparent      (PF network translation)

then please help verifying that Squid-2.5.STABLE9 + the patch from Bug 1193 compiles cleanly, and that the original IP address discovery still works

Patch file: http://www.squid-cache.org/bugs/attachment.cgi?id=583&action=view


How to apply to the Squid sources:

cd squid-2.5.STABLE9
wget -O- 'http://www.squid-cache.org/bugs/attachment.cgi?id=583&action=view' | 
patch -p0

Then build and install Squid as usual, but with a slight change in squid.conf:

  httpd_accel_port 0

instead of the usual

  httpd_accel_port 80

Note: http_port should be the default 3128, or at least not 80 for this test to be complete.


How to verify that IP address discovery and patch in general works proper:


From a client having port 80 traffic intercepted by the proxy execute

telnet www.squid-cache.org 80 GET / HTTP/1.0 [blank line]

Then verify that you get the Squid page back and that access.log contains a request for http://206.168.0.9/


Please report any success/failure in the bug report: http://www.squid-cache.org/bugs/show_bug.cgi?id=1193

don't forget to mention which of the two configure flags you used.

Regards
Henrik

Reply via email to