[This is a resend as not a single user responded to the first request sent
nearly two weeks ago]
I need help to verify a pending patch for transparent interception on
various platforms. I can only verify this on Linux myself.
If you run Squid as a transparent proxy on another platform than Linux,
using one of the following configure options:
--enable-ipf-transparent (IP-Filter)
--enable-pf-transparent (PF network translation)
then please help verifying that Squid-2.5.STABLE9 + the patch from Bug
1193 compiles cleanly, and that the original IP address discovery still
works
Patch file:
http://www.squid-cache.org/bugs/attachment.cgi?id=583&action=view
How to apply to the Squid sources:
cd squid-2.5.STABLE9
wget -O- 'http://www.squid-cache.org/bugs/attachment.cgi?id=583&action=view' | patch -p0
Then build and install Squid as usual in transparently interception mode,
but with a slight change in squid.conf:
httpd_accel_port 0
instead of the usual
httpd_accel_port 80
Note: http_port should be the default 3128, or at least not 80 for this
test to be complete.
How to verify that IP address discovery and patch in general works proper:
From a client having port 80 traffic intercepted by the proxy execute
telnet www.squid-cache.org 80
GET / HTTP/1.0
[blank line]
Then verify that you get the Squid page back and that access.log contains
a request for http://206.168.0.9/
Regards
Henrik
Received on Tue Mar 29 2005 - 16:07:33 MST
This archive was generated by hypermail pre-2.1.9 : Fri Apr 01 2005 - 12:00:03 MST