[squid-users] SECURITY ALERT: Host header forgery detected on local

From: Dr.x <ahmed.zaeem_at_netstream.ps>
Date: Fri, 20 Dec 2013 12:51:05 -0800 (PST)

hi ,

i have this logs and wondering if it is harmful :
im ==>>using squid 3.3.9
Squid Cache: Version 3.3.9
==========================================================================
2013/12/20 15:41:00.747 kid1| SECURITY ALERT: Host header forgery detected
on local=10.10.0.50:80 remote=x.x.x.x FD 573 flags=17 (local IP does not
match any domain IP)
2013/12/20 15:41:00.747 kid1| SECURITY ALERT: By user agent:
2013/12/20 15:41:00.747 kid1| SECURITY ALERT: on URL:
client9.dropbox.com:443
2013/12/20 15:41:00.747 kid1| abandoning local=10.10.0.50:80 remote=x.x.x.x
FD 573 flags=17
 kid1| SECURITY ALERT: Host header forgery detected on local=10.10.0.50:80
remote=x.x.x.x FD 163 flags=17 (local IP does not match any domain IP)
2013/12/20 15:41:29.611 kid1| SECURITY ALERT: By user agent:
2013/12/20 15:41:29.611 kid1| SECURITY ALERT: on URL: d.dropbox.com:443
2013/12/20 15:41:29.611 kid1| abandoning local=10.10.0.50:80 remote=x.x.x.x
FD 163 flags=17
===========================================================================

wish to clarify if it is harmfull log

regards

-----
Dr.x

--
View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/SECURITY-ALERT-Host-header-forgery-detected-on-local-tp4663961.html
Sent from the Squid - Users mailing list archive at Nabble.com.
Received on Fri Dec 20 2013 - 20:51:52 MST

This archive was generated by hypermail 2.2.0 : Sun Dec 22 2013 - 12:00:04 MST