[squid-users] Using tcp_outgoing_address with ACL

Andrey K ankor2023 at gmail.com
Mon Jun 26 14:11:28 UTC 2023


Hello, Alex,

Thank you very much!

I will try the suggested workaround and share results.

Kind regards,
      Ankor.




пн, 26 июн. 2023 г. в 16:49, Alex Rousskov <rousskov at measurement-factory.com
>:

> On 6/23/23 08:05, Andrey K wrote:
>
> > A link to the uploaded ALL,9 log is: ...
>
> Your Squid is suffering from a bug in its ICAP client implementation:
> AFAICT, all ICAP transactions will trigger these WARNINGS if
> tcp_outgoing_address rules (the ones these ICAP transactions can reach)
> use a request-dependent ACL (e.g., dstdomain).
>
> I filed bug #5280 at https://bugs.squid-cache.org/show_bug.cgi?id=5280
>
> The workaround suggested in my previous response should avoid these
> WARNINGS for the affected ICAP transactions. However, it will also
> effectively disable these WARNINGS for other transactions without
> requests (if any). There may be a way to be more selective, but I cannot
> suggest something specific right now. FWIW, the "transaction_initiator"
> ACL cannot help here because it needs access to the request as well.
>
>
> HTH,
>
> Alex.
>
>
> >>> I think we could ignore these warnings as squid works perfectly
> >
> >  > I do not think we have enough information to reach that "works
> >  > perfectly" conclusion. At the very least, you should test with a
> domain
> >  > that should match domdst_SIProxy rather than one that should not match
> >  > (and does not match, but for the wrong reason).
> >
> > This is a production system and it works as expected: for domains from
> > the domdst_SIProxy ACL it uses correct tcp_outgoing_address:
> 10.72.235.184
> >
> >  > If you do not want to know what is actually going on (e.g., whether
> >  > there is a Squid bug or misconfiguration here), then you can use a
> "has"
> >  > ACL to protect your domdst_SIProxy ACL in tcp_outgoing_address context
> >  > from request-free evaluations. Here is an untested sketch:
> >  >
> >  >     acl hasRequest has request
> >  >
> >  >     # If Squid has no request access (possibly due to Squid bugs),
> >  >     # then do not use 10.72.235.184, even if domdst_SIProxy would
> >  >     # have matched if Squid had access to the request.
> >  >     tcp_outgoing_address 10.72.235.184 hasRequest domdst_SIProxy
> >
> > Thank you, Alex, I will try this workaround after you have time to take
> > a look at ALL,9 log.
> >
> > Kind regards,
> >       Ankor.
> >
> >
> > чт, 22 июн. 2023 г. в 20:11, Alex Rousskov
> > <rousskov at measurement-factory.com
> > <mailto:rousskov at measurement-factory.com>>:
> >
> >     On 6/22/23 04:59, Andrey K wrote:
> >
> >      > I reproduced the issue in the test environment.
> >      > I configured my squid with the debug_options: ALL,1 28,9
> >      > and ran the test curl from the same proxy host:
> >      >     curl -m 4 -k --tlsv1.2 --proxy-user 'user:pass' -s -o
> >     /dev/null -w
> >      > "%{http_code}"  --proxy localhost:3131 https://archive.org
> >     <https://archive.org>
> >      > <https://archive.org <https://archive.org>>
> >      >
> >      > The client got the 200-response and it works fine.
> >      >
> >      > In the access.log the corresponding records are:
> >      >     2023-06-22 10:59:58|    747 127.0.0.1 NONE_NONE/200/- 0
> CONNECT
> >      > archive.org:443 <http://archive.org:443> <http://archive.org:443
> >     <http://archive.org:443>> - HIER_DIRECT/archive.org
> >     <http://archive.org>
> >      > <http://archive.org <http://archive.org>> - - - -
> >      >     2023-06-22 10:59:58|    201 127.0.0.1 TCP_MISS/200/200 3833
> GET
> >      > https://archive.org/ <https://archive.org/> <https://archive.org/
> >     <https://archive.org/>> - HIER_DIRECT/archive.org <
> http://archive.org>
> >      > <http://archive.org <http://archive.org>> text/html - - -
> >      >
> >      > The cache.log is available at the link:
> >      >
> >
> https://drive.google.com/file/d/12xQch5nHAzijAh4PxZV4mZzjviYX7l7B/view?usp=sharing
> <
> https://drive.google.com/file/d/12xQch5nHAzijAh4PxZV4mZzjviYX7l7B/view?usp=sharing
> >
> >
> >      > There are three warnings there:
> >      >     grep WARN /tmp/acl.log
> >      >     2023/06/22 10:59:57.875 kid6| WARNING: domdst_SIProxy ACL is
> >     used in
> >      > context without an HTTP request. Assuming mismatch.
> >      >     2023/06/22 10:59:57.884 kid6| WARNING: domdst_SIProxy ACL is
> >     used in
> >      > context without an HTTP request. Assuming mismatch.
> >      >     2023/06/22 10:59:58.536 kid6| WARNING: domdst_SIProxy ACL is
> >     used in
> >      > context without an HTTP request. Assuming mismatch.
> >
> >     The shared log is not detailed enough for me to pinpoint the problem,
> >     but there are several places in Squid code where
> >     tcp_outgoing_address is
> >     used without a request. Some of those places look like Squid bugs to
> >     me.
> >     Some look legitimate. Again, I cannot tell whether your Squid is
> >     hitting
> >     one of those places; if you want more definitive answers, please
> >     share a
> >     compressed ALL,9 log while reproducing the problem with that curl
> >     transaction:
> >
> >
> https://wiki.squid-cache.org/SquidFaq/BugReporting#debugging-a-single-transaction
> <
> https://wiki.squid-cache.org/SquidFaq/BugReporting#debugging-a-single-transaction
> >
> >
> >      > The domdst_SIProxy ACL is used only to change the outgoing
> >     address for
> >      > specific domains
> >
> >      > The test URL https://archive.org <https://archive.org> is not in
> >     the domdst_SIProxy list.
> >
> >     That fact does not matter -- the warnings are printed (and the
> >     directive
> >     is ignored) _before_ Squid checks the configured/listed values.
> >
> >
> >      > I think we could ignore these warnings as squid works perfectly
> >
> >     I do not think we have enough information to reach that "works
> >     perfectly" conclusion. At the very least, you should test with a
> domain
> >     that should match domdst_SIProxy rather than one that should not
> match
> >     (and does not match, but for the wrong reason).
> >
> >
> >      > maybe there is a workaround to suppress logs flooding?
> >
> >     If you do not want to know what is actually going on (e.g., whether
> >     there is a Squid bug or misconfiguration here), then you can use a
> >     "has"
> >     ACL to protect your domdst_SIProxy ACL in tcp_outgoing_address
> context
> >     from request-free evaluations. Here is an untested sketch:
> >
> >           acl hasRequest has request
> >
> >           # If Squid has no request access (possibly due to Squid bugs),
> >           # then do not use 10.72.235.184, even if domdst_SIProxy would
> >           # have matched if Squid had access to the request.
> >           tcp_outgoing_address 10.72.235.184 hasRequest domdst_SIProxy
> >
> >
> >     Otherwise, consider sharing an ALL,9 log as discussed above.
> >
> >
> >     HTH,
> >
> >     Alex.
> >
> >
> >      > пн, 12 июн. 2023 г. в 10:54, <ngtech1ltd at gmail.com
> >     <mailto:ngtech1ltd at gmail.com>
> >      > <mailto:ngtech1ltd at gmail.com <mailto:ngtech1ltd at gmail.com>>>:
> >      >
> >      >     Hey Ankor,
> >      >
> >      >     There is some missing context so I would be able to reproduce
> >     this
> >      >     issue.
> >      >     Is this some kind of CONNECT request?
> >      >
> >      >     If you can describe in more technical details the setup and
> what
> >      >     client are you using,
> >      >     Maybe couple sanitized log lines it would help to understand
> >     better
> >      >     the scenario.
> >      >
> >      >     Eliezer
> >      >
> >      >     From: squid-users <squid-users-bounces at lists.squid-cache.org
> >     <mailto:squid-users-bounces at lists.squid-cache.org>
> >      >     <mailto:squid-users-bounces at lists.squid-cache.org
> >     <mailto:squid-users-bounces at lists.squid-cache.org>>> On Behalf Of
> >      >     Andrey K
> >      >     Sent: Friday, June 9, 2023 10:03
> >      >     To: Squid Users <squid-users at lists.squid-cache.org
> >     <mailto:squid-users at lists.squid-cache.org>
> >      >     <mailto:squid-users at lists.squid-cache.org
> >     <mailto:squid-users at lists.squid-cache.org>>>; Amos Jeffries
> >      >     <squid3 at treenet.co.nz <mailto:squid3 at treenet.co.nz>
> >     <mailto:squid3 at treenet.co.nz <mailto:squid3 at treenet.co.nz>>>
> >      >     Subject: [squid-users] Using tcp_outgoing_address with ACL
> >      >
> >      >     Hello,
> >      >
> >      >     We use the tcp_outgoing_address feature to access some hosts
> >     using a
> >      >     dedicated source IP address.
> >      >
> >      >         acl domdst_SIProxy  dstdomain
> >      >     "/data/squid.user/etc/squid/categories/domdst_SIProxy"
> >      >         tcp_outgoing_address 10.72.235.129 domdst_SIProxy
> >      >
> >      >     It works fine, but logs are flooded with warnings like this:
> >      >         2023/06/09 08:30:07 kid2| WARNING: domdst_SIProxy ACL is
> >     used in
> >      >     context without an HTTP request. Assuming mismatch.
> >      >
> >      >     I found a similar case:
> >      >
> >
> http://lists.squid-cache.org/pipermail/squid-users/2015-January/001629.html
> <
> http://lists.squid-cache.org/pipermail/squid-users/2015-January/001629.html>
> <
> http://lists.squid-cache.org/pipermail/squid-users/2015-January/001629.html
> <
> http://lists.squid-cache.org/pipermail/squid-users/2015-January/001629.html>>
> where Amos suggested using a patch as a solution.
> >      >     We have Squid Version 5.5. Is there a similar patch for our
> >     version,
> >      >     or can we just ignore these messages?
> >      >
> >      >     Kind regards,
> >      >             Ankor.
> >      >
> >      >     _______________________________________________
> >      >     squid-users mailing list
> >      > squid-users at lists.squid-cache.org
> >     <mailto:squid-users at lists.squid-cache.org>
> >      >     <mailto:squid-users at lists.squid-cache.org
> >     <mailto:squid-users at lists.squid-cache.org>>
> >      > http://lists.squid-cache.org/listinfo/squid-users
> >     <http://lists.squid-cache.org/listinfo/squid-users>
> >      >     <http://lists.squid-cache.org/listinfo/squid-users
> >     <http://lists.squid-cache.org/listinfo/squid-users>>
> >      >
> >      >
> >      > _______________________________________________
> >      > squid-users mailing list
> >      > squid-users at lists.squid-cache.org
> >     <mailto:squid-users at lists.squid-cache.org>
> >      > http://lists.squid-cache.org/listinfo/squid-users
> >     <http://lists.squid-cache.org/listinfo/squid-users>
> >
> >     _______________________________________________
> >     squid-users mailing list
> >     squid-users at lists.squid-cache.org
> >     <mailto:squid-users at lists.squid-cache.org>
> >     http://lists.squid-cache.org/listinfo/squid-users
> >     <http://lists.squid-cache.org/listinfo/squid-users>
> >
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.squid-cache.org/pipermail/squid-users/attachments/20230626/2ea10e53/attachment-0001.htm>


More information about the squid-users mailing list