<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class=""><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Not just the Squid machine but *all* the clients going through your Squid also have to be using the same DNS resolver for that workaround. Any of them using other resolvers (eg 8.8.8.8 or similar services) *will* hit these errors.<br></blockquote></span><span class="">
<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
And this is my dns config in squid.config :<br>
<br>
# --------- DNS AND IP CACHES [4341]<br>
<br>
dns_nameservers 127.0.0.1<br>
dns_v4_first on<br>
#original_dst off<br>
client_dst_passthru off<br>
</blockquote>
<br></span>
The above setting is rejecting clients when the host verify fails.<br>
TO let traffic through the proxy when host-verify fails set it back to the default "client_dst_passthru on".<br>
<br>
The Host verify failure is most dangerous when cached - so that is always prohibited. But upstream routing is difficult for Squid to determine - thus that config option. It is left up to you whether you risk your clients getting infected by that mechanism - Squid just minimizes the damage and risk by limiting it to the one client making the suspicious request.<div class="HOEnZb"><div class="h5"><br></div></div></blockquote></div><br clear="all"><div>Thanks alot for your suggestion, i thought that i made some mistake in my DNS. I will try to find out and show you the result.</div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div><div>Thanks & Best Regards,<br>--------------<br></div>Đỗ Hoàng Minh Hưng<br></div>Gmail : <a href="mailto:hoangminhung@gmail.com" target="_blank">hoangminhung@gmail.com</a><br></div>SĐT : 01234454115<br></div></div></div></div>
</div></div>