Hello,

I was using the squid-reverse package based on squid 2.x up till last week when i seen it was upgraded and now using the 3.x version of squid. After upgrading it appeared my QOS ACLs were not marking traffic which matched any longer. This was confirmed by viewing the logs and using tcpdump. I was wondering if someone had any thoughts on this or can confirm/deny it on their own systems.

thanks for your time,
greg



info::

squid.conf ACL section:

acl youtube url_regex -i youtube
tcp_outgoing_tos 0x28 youtube

Some ACL's are marking with 0x38 and 0x20


and at a rate which seems to be hundreds a second,  in the cache.log file:

2012/03/26 13:51:37| comm_set_tos: setsockopt(IP_TOS) on FD 391: (22) Invalid argument 2012/03/26 13:51:37| comm_set_tos: setsockopt(IP_TOS) on FD 466: (22) Invalid argument 2012/03/26 13:51:37| comm_set_tos: setsockopt(IP_TOS) on FD 626: (22) Invalid argument 2012/03/26 13:51:37| comm_set_tos: setsockopt(IP_TOS) on FD 133: (22) Invalid argument


I loaded some pages I know will be an ACL match, confirmed the tos bits were not being modified by squid:

16:43:50.107671 IP (tos 0x0, ttl 64, id 3501, offset 0, flags [DF], proto TCP (6), length 52) 16:43:50.109958 IP (tos 0x0, ttl 60, id 20686, offset 0, flags [DF], proto TCP (6), length 1492) 16:43:50.109981 IP (tos 0x0, ttl 64, id 58289, offset 0, flags [DF], proto TCP (6), length 52)
--------------------------------------------------------------










_______________________________________________
List mailing list
[email protected]
http://lists.pfsense.org/mailman/listinfo/list

Reply via email to