[squid-users] range_offset_limit not working as expected

Amos Jeffries squid3 at treenet.co.nz
Mon Sep 5 14:09:55 UTC 2016


What are you expecting?

The Squid native format access.log shows what was delivered to the
client, and what server was involved. It does not show how the
range_offset_limit directive affected the server connection messages.

The ORIGINAL_DST indicates that this is intercepted traffic.

Notice how the TCP_MISS transactions are rotating through different IP
addresses and using ORIGINAL_DST. That is usualy a sign that Host header
verification is unable to match the destination domain name with the
client contacted IP address on many transactions.

There is a mix of TCP_HIT/206 when that verification succeeds in its
matching.

Amos



More information about the squid-users mailing list