]> git.ipfire.org Git - thirdparty/squid.git/commit
Bug 3626: Forwarding loops on intercepted traffic
authorAmos Jeffries <squid3@treenet.co.nz>
Sun, 9 Sep 2012 10:04:39 +0000 (04:04 -0600)
committerAmos Jeffries <squid3@treenet.co.nz>
Sun, 9 Sep 2012 10:04:39 +0000 (04:04 -0600)
commitfa8df22ad2840e1865c27ed0df8019299bc51343
tree2f6a84430c822e3089a54f8315c07be69e520698
parent0ec84481458772c7f1e9105936053576f78b9c61
Bug 3626: Forwarding loops on intercepted traffic

Changes to interception handling in 3.2 series (namely the preference
for using ORIGINAL_DST) have increased the chances that misconfigured
network systems involving Squid will hit forwarding loops.

Two instances are currently known:
 * passing forward-proxy traffic to a interception port.
 * NAT performed on a separate box.

This enacts an old TODO by removing the loop detection bypass for
intercepted traffic and accelerated traffic. Now we always check for
loops regardless of how the request was received.

NOTE: accel mode was only included due to the TODO.
      If problems are found there it can be re-instated.
src/client_side_reply.cc