On 2014-07-04 15:19, winetbox wrote:
This is because of the fix for CVE-2009-0801. NAT on a separate machine
has never actually worked properly even in 2.7. The fix we have in
current Squid involves verifying the TCP destination IP, which also
enforces that NAT is performed on the Squid machine instead of remotely.
You need to use policy routing or similar mechanisms on the router to
get the packets to the Squid machine unchanged for interception to work.

Amos

on the contrary, my setup was working perfectly on those versions, because
i'm not using the same machine for NAT routing. for routing, i leave
everything on mikrotik, what squid do is only accept redirected request from
mikrotik.

TCP connections arriving at Squid had corrupted destination IP address due to NAT changes on the microtik. Old squid used to *guess* the destination based on Host: header in the HTTP request. This was proven to be a mistake (see CVE details) and current versions use the original dst IP (http://www.squid-cache.org/Doc/config/client_dst_passthru/).

Amos

Reply via email to