Landy Landy wrote:
Hello.
How can I avoid these lines:
2010/01/31 19:44:21| clientParseRequestMethod: Unsupported method attempted by
172.16.100.56: This is not a bug. see squid.conf extension_methods
2010/01/31 19:44:21| clientParseRequestMethod: Unsupported method in request
'h3_`___z___Ca_______A_W'f_________8g_8|iF__u~$__"__(_E___)R_h[_[_____p_r4o__?U_w~mn___u____n____9S__'
2010/01/31 19:44:21| clientProcessRequest: Invalid Request
2010/01/31 19:53:01| WARNING: redirector #1 (FD 8) exited
2010/01/31 19:54:03| clientParseRequestMethod: Unsupported method attempted by
172.16.100.56: This is not a bug. see squid.conf extension_methods
2010/01/31 19:54:03| clientParseRequestMethod: Unsupported method in request
'z__y____AfN[___t___h_____W___^_a____V______4_____._______A__qY__}s_[f___w^1_7W_E*_&%e________S`____a'
2010/01/31 19:54:03| clientProcessRequest: Invalid Request
2010/01/31 19:58:41| clientParseRequestMethod: Unsupported method attempted by
172.16.100.56: This is not a bug. see squid.conf extension_methods
2010/01/31 19:58:41| clientParseRequestMethod: Unsupported method in request
'____;__w_____o'
2010/01/31 19:58:41| clientProcessRequest: Invalid Request
Prevent 172.16.100.56 from sending invalid HTTP requests to your Squid
server. Pulling the Ethernet cable, shutting the switch port or adding
a software firewall rule preventing communications from this host are
all valid (though, nuke-it-from-orbit) methods of achieving this goal.
Identifying the application on this host that is sending the non-HTTP
data to your Squid server and configuring it such that it refrains is
probably a more prudent approach.
Chris