On Sat, Jun 11, 2016 at 2:14 PM, Gert Doering <g...@greenie.muc.de> wrote:

> One thing I noticed when testing which is not *caused* by this patch but
> which you/we might want to fix while at it.
>
> When talking to a "deaf" HTTP proxy - namely, one that accepts the TCP
> connect, but then never sends back anything (try 195.30.4.1:23, it's
> a "Teergrube" to annoy wannabe hackers) the timeout will fire at the
> correct interval - 25s in my test, but then it won't restart but exit:
>
> Sat Jun 11 20:05:59 2016 Attempting to establish TCP connection with
> [AF_INET]195.30.4.1:23 [nonblock]
> Sat Jun 11 20:06:00 2016 TCP connection established with [AF_INET]
> 195.30.4.1:23
> Sat Jun 11 20:06:00 2016 Send to HTTP proxy: 'CONNECT 10.0.0.1:51196
> HTTP/1.0'
> Sat Jun 11 20:06:00 2016 Send to HTTP proxy: 'Host: 10.0.0.1'
> Sat Jun 11 20:06:24 2016 recv_line: TCP port read timeout expired:
> Operation now in progress (errno=115)
> Sat Jun 11 20:06:24 2016 SIGTERM[soft,init_instance] received, process
> exiting
>


Isn't this controlled by the http-proxy-retry option which is off by
default? Set that in the config and SIGUSR1 restart should happen, I
think...

Selva

Reply via email to