Re: [squid-users] Squid 4.x and Peek and Splice - Host Header Forgery

2016-10-18 Thread John Wright
o i keep using squid? On Tue, Oct 18, 2016 at 2:10 PM, John Wright <unixd...@gmail.com> wrote: > In response to it not being a false positive , maybe its not specifically > the TTL but in this other article on the mailing lists someone else had the > same issue > > > Here is t

Re: [squid-users] Squid 4.x and Peek and Splice - Host Header Forgery

2016-10-18 Thread John Wright
n *>>* attack and normal DNS behaviour the only code change possible is to *>>* disable the check (see above about the risk level). *>> On Tue, Oct 18, 2016 at 2:01 PM, <gar...@comnet.uz> wrote: > On 2016-10-18 22:42, John Wright wrote: > >> Hi >> >>

Re: [squid-users] Squid 4.x and Peek and Splice - Host Header Forgery

2016-10-18 Thread John Wright
as low as 5 seconds. That being said , when it is changing every 3-5 seconds which comes and goes , squid gives the header forgery errors as shown before. On Tue, Oct 18, 2016 at 12:30 PM, <gar...@comnet.uz> wrote: > On 2016-10-18 18:32, John Wright wrote: > >> Hi, >> >

[squid-users] Squid 4.x and Peek and Splice - Host Header Forgery

2016-10-18 Thread John Wright
Hi, I have a constant problem with Host header forgery detection on squid doing peek and splice. I see this most commonly with CDN, Amazon and microsoft due to the fact there TTL is only 5 seconds on certain dns entries im connecting to. So when my client connects through my squid i get host