Changes to squid-3.1.15 (28 Aug 2011):
- Regression fix: vhost and defaultsite causing vport to be ignored
+ - Regression Bug 3295: broken escaping in rfc1738_do_escape
- Bug #3232: fails to compile with OpenSSL v1.0.0
- Bug #3222: cache_peer name is not logging on CONNECT
- Bug #3131: fd_table[fd].closing() assert from ConnStateData::noteMoreBodySpaceAvailable()
- Bug #1791: timestampsSet does not validate Date: if server sends very old date
- Correct parsing of large Gopher indexes
- Enable negative cacheing on unknown or -1 expiry timestamp
+ - Remove hierarchy_stoplist default value
- Migrate cf_gen tool from C-style to C++
- ... and several documentation and compiler warning fixes
<P>
<UL>
<LI>The lack of some features available in Squid-2.x series. See the regression sections below for full details.</LI>
-<LI>CVE-2009-0801 : NAT interception vulnerability to malicious clients.</LI>
+<LI>CVE-2009-0801 : NAT interception vulnerability to malicious clients. This is fixed in 3.2 series.</LI>
</UL>
</P>
<DT><B>header_replace</B><DD>
<P>Deprecated. Use request_header_replace or reply_header_replace instead.</P>
+<DT><B>hierarchy_stoplist</B><DD>
+<P>Default value altered to no content, allowing dynamic websites to be fetched through peers.</P>
+
<DT><B>http_port transparent intercept ssl-bump connection-auth[=on|off] ignore-cc</B><DD>
<P>Option 'transparent' is being deprecated in favour of 'intercept' which more clearly identifies what the option does.
For now option 'tproxy' remains with old behaviour meaning fully-invisible proxy using TPROXY support.</P>
<itemize>
<item>The lack of some features available in Squid-2.x series. See the regression sections below for full details.
- <item>CVE-2009-0801 : NAT interception vulnerability to malicious clients.
+ <item>CVE-2009-0801 : NAT interception vulnerability to malicious clients. This is fixed in 3.2 series.
</itemize>
<p>Currently known issues which only depends on available developer time and may still be resolved in a future 3.1 release are: