+Changes to squid-3.1.0.14 (27 Sep 2009):
+
+ - Bug 2777: Various build issues on OpenSolaris
+ - Bug 2773: Segfault in RFC2069 Digest authentication
+ - Bug 2747: Compile errors on Solaris 10
+ - Bug 2735: Incomplete -fhuge-objects detection
+ - Bug 2722: Fix http_port accel combined with CONNECT
+ - Bug 2718: FTP sends EPSV2 on IPv4 connection
+ - Bug 2648: stateful helpers stuck in reserved
+ - Bug 2570: wccp2 "Here I Am" announcements not sent in memory-ony mode
+ - Bug 2510: digest_ldap_auth uses incorrect logic with TLS
+ - Bug 2483: bind() called before connect()
+ - Bug 2215: config file line length limit (extended to 2 KB)
+ - Support Accept-Language: * wildcard
+ - Support autoconf 2.64
+ - Support TPROXY for IPv6 traffic (requires kernel support)
+ - Support TPROXY cache cluster behind WCCPv2
+ - Correct ESI support to work in multi-mode Squid
+ - Add 0.0.0.0 as an to_localhost address
+ - DiskIO detection fixes and use optimal IO in default build.
+ - Correct peer connect-fail-limit default of 10
+ - Prevent squidclient sending two Accept: headers
+ - ... all bug fixes from 3.0.STABLE19
+ - ... and many more documentation fixes
+
Changes to squid-3.1.0.13 (04 Aug 2009):
- Bug 2723 regression: enable PURGE requests if PURGE method ACL is present.
<DT><B>cache_mem</B><DD>
<P>Default size increased to 256MB.</P>
-<DT><B>cache_peer htcp-no-clr htcp-no-purge-clr htcp-only-clr htcp-forward-clr connection-auth[=on|off|auto] connect-fail-limit=N</B><DD>
+<DT><B>cache_peer htcp-no-clr htcp-no-purge-clr htcp-only-clr htcp-forward-clr connection-auth[=on|off|auto] connect-fail-limit=N no-tproxy</B><DD>
<P>New Options.
<PRE>
use 'htcp-no-clr' to send HTCP to the neighbor but without
use 'connect-fail-limit=nn' to specify how many times
connecting to a peer must fail before it is marked as
down. Default is 10.
+
+ use 'no-tproxy' to specify that requests passed to this peer
+ are not to have the client IP spoofed. For use to prevent
+ packet routing issues with a cluster of peers behind WCCPv2.
</PRE>
</P>
</PRE>
</P>
-<DT><B>http_port transparent intercept sslbump connection-auth[=on|off]</B><DD>
+<DT><B>http_port transparent intercept sslbump connection-auth[=on|off] ignore-cc</B><DD>
<P>Option 'transparent' is being deprecated in favour of 'intercept' which more clearly identifies what the option does.
For now option 'tproxy' remains with old behaviour meaning fully-invisible proxy using TPROXY support.</P>
<P>New port options
the connection, interval how often to probe, and
timeout the time before giving up.
+ ignore-cc Ignore request Cache-Control headers.
+
+ Warning: This option violates HTTP specifications if
+ used in non-accelerator setups.
+
sslBump Intercept each CONNECT request matching ssl_bump ACL,
establish secure connection with the client and with
the server, decrypt HTTP messages as they pass through
<P>Better support for Linux using the external DNS helper.
The helper will now compile and work with dns_nameservers on more variants of Linux than previously.</P>
+<DT><B>--with-aio</B><DD>
+<P>Deprecated. POSIX AIO is now auto-detected and enabled.
+Use --without-aio to disable, but only if you really have to.</P>
+
+<DT><B>--with-pthreads</B><DD>
+<P>Deprecated. pthreads library is now auto-detected and enabled.
+Use --without-pthreads to disable, but only if you really have to.</P>
+
</DL>
</P>
<H2><A NAME="removedoptions"></A> <A NAME="ss5.3">5.3</A> <A HREF="#toc5.3">Removed options</A>
<tag>cache_mem</tag>
<p>Default size increased to 256MB.
- <tag>cache_peer htcp-no-clr htcp-no-purge-clr htcp-only-clr htcp-forward-clr connection-auth[=on|off|auto] connect-fail-limit=N</tag>
+ <tag>cache_peer htcp-no-clr htcp-no-purge-clr htcp-only-clr htcp-forward-clr connection-auth[=on|off|auto] connect-fail-limit=N no-tproxy</tag>
<p>New Options.
<verb>
use 'htcp-no-clr' to send HTCP to the neighbor but without
use 'connect-fail-limit=nn' to specify how many times
connecting to a peer must fail before it is marked as
down. Default is 10.
+
+ use 'no-tproxy' to specify that requests passed to this peer
+ are not to have the client IP spoofed. For use to prevent
+ packet routing issues with a cluster of peers behind WCCPv2.
</verb>
<tag>cache_store_log</tag>