<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
span.EmailStyle18
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple style='word-wrap:break-word'><div class=WordSection1><p class=MsoNormal>Hey Usama,<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>There are more missing details on the system.<o:p></o:p></p><p class=MsoNormal>If you provide the OS and squid details I might be able to provide a script that will pull most of the relevant details on the system.<o:p></o:p></p><p class=MsoNormal>I don’t know about this specific issue yet and it seems like there is a SSL related issue and it might not be even related to Squid.<o:p></o:p></p><p class=MsoNormal>(@Alex Or @Chrisots might know better then me)<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>All The Bests,<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>----<o:p></o:p></p><p class=MsoNormal>Eliezer Croitoru<o:p></o:p></p><p class=MsoNormal>NgTech, Tech Support<o:p></o:p></p><p class=MsoNormal>Mobile: +972-5-28704261<o:p></o:p></p><p class=MsoNormal>Email: <a href="mailto:ngtech1ltd@gmail.com">ngtech1ltd@gmail.com</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><div style='border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b>From:</b> squid-users <squid-users-bounces@lists.squid-cache.org> <b>On Behalf Of </b>Usama Mehboob<br><b>Sent:</b> Thursday, February 24, 2022 23:45<br><b>To:</b> squid-users@lists.squid-cache.org<br><b>Subject:</b> [squid-users] Getting SSL Connection Errors<o:p></o:p></p></div><p class=MsoNormal><o:p> </o:p></p><div><div><div><div><p class=MsoNormal style='margin-bottom:12.0pt'>Hi I have a squid running on a linux box ( about 16GB ram and 4 cpu ) -- it runs fine for the most part but when I am launching multiple jobs that are connecting with salesforce BulkAPI, sometimes connections are dropped. its not predictable and happens only when there is so much load on squid. Can anyone shed some light on this? what can I do? is it a file descriptor issue?<o:p></o:p></p></div><p class=MsoNormal>I see only these error messages from the cache logs<br>```<br>PeerConnector.cc(639) handleNegotiateError: Error (error:04091068:rsa routines:INT_RSA_VERIFY:bad signature) but, hold write on SSL connection on FD 109<br>```<o:p></o:p></p></div><p class=MsoNormal style='margin-bottom:12.0pt'>----------------Config file ----------------<br>visible_hostname squid <br><br>#<br># Recommended minimum configuration:<br>#<br><br># Example rule allowing access from your local networks.<br># Adapt to list your (internal) IP networks from where browsing<br># should be allowed<br>acl localnet src <a href="http://10.0.0.0/8" target="_blank">10.0.0.0/8</a> # RFC1918 possible internal network<br>acl localnet src <a href="http://172.16.0.0/12" target="_blank">172.16.0.0/12</a> # RFC1918 possible internal network<br>acl localnet src <a href="http://192.168.0.0/16" target="_blank">192.168.0.0/16</a> # RFC1918 possible internal network<br>acl localnet src fc00::/7 # RFC 4193 local private network range<br>acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines<br><br>acl SSL_ports port 443<br>acl Safe_ports port 80 # http<br>###acl Safe_ports port 21 # ftp testing after blocking itp<br>acl Safe_ports port 443 # https<br>acl Safe_ports port 70 # gopher<br>acl Safe_ports port 210 # wais<br>acl Safe_ports port 1025-65535 # unregistered ports<br>acl Safe_ports port 280 # http-mgmt<br>acl Safe_ports port 488 # gss-http<br>acl Safe_ports port 591 # filemaker<br>acl Safe_ports port 777 # multiling http<br>acl CONNECT method CONNECT<br><br>#<br># Recommended minimum Access Permission configuration:<br>#<br># Deny requests to certain unsafe ports<br>http_access deny !Safe_ports<br><br># Deny CONNECT to other than secure SSL ports<br>http_access deny CONNECT !SSL_ports<br>#http_access allow CONNECT SSL_ports<br><br># Only allow cachemgr access from localhost<br>http_access allow localhost manager<br>http_access deny manager<br><br># We strongly recommend the following be uncommented to protect innocent<br># web applications running on the proxy server who think the only<br># one who can access services on "localhost" is a local user<br>#http_access deny to_localhost<br><br>#<br># INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS<br>#<br><br># Example rule allowing access from your local networks.<br># Adapt localnet in the ACL section to list your (internal) IP networks<br># from where browsing should be allowed<br><br># And finally deny all other access to this proxy<br><br># Squid normally listens to port 3128<br>#http_port 3128<br>http_port 3129 intercept<br>https_port 3130 cert=/etc/squid/ssl/squid.pem ssl-bump intercept <br>http_access allow SSL_ports #-- this allows every https website<br>acl step1 at_step SslBump1 <br>acl step2 at_step SslBump2 <br>acl step3 at_step SslBump3 <br>ssl_bump peek step1 all <br><br># Deny requests to proxy instance metadata <br>acl instance_metadata dst 169.254.169.254 <br>http_access deny instance_metadata <br><br># Filter HTTP Only requests based on the whitelist <br>#acl allowed_http_only dstdomain .<a href="http://veevasourcedev.com" target="_blank">veevasourcedev.com</a> .<a href="http://google.com" target="_blank">google.com</a> .<a href="http://pypi.org" target="_blank">pypi.org</a> .<a href="http://youtube.com" target="_blank">youtube.com</a><br>#acl allowed_http_only dstdomain .<a href="http://amazonaws.com" target="_blank">amazonaws.com</a><br>#acl allowed_http_only dstdomain .<a href="http://veevanetwork.com" target="_blank">veevanetwork.com</a> .<a href="http://veevacrm.com" target="_blank">veevacrm.com</a> .<a href="http://veevacrmdi.com" target="_blank">veevacrmdi.com</a> .<a href="http://veeva.com" target="_blank">veeva.com</a> .<a href="http://veevavault.com" target="_blank">veevavault.com</a> .<a href="http://vaultdev.com" target="_blank">vaultdev.com</a> .<a href="http://veevacrmqa.com" target="_blank">veevacrmqa.com</a><br>#acl allowed_http_only dstdomain .<a href="http://documentforce.com" target="_blank">documentforce.com</a> .<a href="http://sforce.com" target="_blank">sforce.com</a> .<a href="http://force.com" target="_blank">force.com</a> .<a href="http://forceusercontent.com" target="_blank">forceusercontent.com</a> .<a href="http://force-user-content.com" target="_blank">force-user-content.com</a> .<a href="http://lightning.com" target="_blank">lightning.com</a> .<a href="http://salesforce.com" target="_blank">salesforce.com</a> .<a href="http://salesforceliveagent.com" target="_blank">salesforceliveagent.com</a> .<a href="http://salesforce-communities.com" target="_blank">salesforce-communities.com</a> .<a href="http://salesforce-experience.com" target="_blank">salesforce-experience.com</a> .<a href="http://salesforce-hub.com" target="_blank">salesforce-hub.com</a> .<a href="http://salesforce-scrt.com" target="_blank">salesforce-scrt.com</a> .<a href="http://salesforce-sites.com" target="_blank">salesforce-sites.com</a> .<a href="http://site.com" target="_blank">site.com</a> .<a href="http://sfdcopens.com" target="_blank">sfdcopens.com</a> .sfdc.sh .<a href="http://trailblazer.me" target="_blank">trailblazer.me</a> .<a href="http://trailhead.com" target="_blank">trailhead.com</a> .<a href="http://visualforce.com" target="_blank">visualforce.com</a><br><br><br># Filter HTTPS requests based on the whitelist <br>acl allowed_https_sites ssl::server_name .<a href="http://pypi.org" target="_blank">pypi.org</a> .<a href="http://pythonhosted.org" target="_blank">pythonhosted.org</a> .<a href="http://tfhub.dev" target="_blank">tfhub.dev</a> .<a href="http://gstatic.com" target="_blank">gstatic.com</a> .<a href="http://googleapis.com" target="_blank">googleapis.com</a><br>acl allowed_https_sites ssl::server_name .<a href="http://amazonaws.com" target="_blank">amazonaws.com</a><br>acl allowed_https_sites ssl::server_name .<a href="http://documentforce.com" target="_blank">documentforce.com</a> .<a href="http://sforce.com" target="_blank">sforce.com</a> .<a href="http://force.com" target="_blank">force.com</a> .<a href="http://forceusercontent.com" target="_blank">forceusercontent.com</a> .<a href="http://force-user-content.com" target="_blank">force-user-content.com</a> .<a href="http://lightning.com" target="_blank">lightning.com</a> .<a href="http://salesforce.com" target="_blank">salesforce.com</a> .<a href="http://salesforceliveagent.com" target="_blank">salesforceliveagent.com</a> .<a href="http://salesforce-communities.com" target="_blank">salesforce-communities.com</a> .<a href="http://salesforce-experience.com" target="_blank">salesforce-experience.com</a> .<a href="http://salesforce-hub.com" target="_blank">salesforce-hub.com</a> .<a href="http://salesforce-scrt.com" target="_blank">salesforce-scrt.com</a> .<a href="http://salesforce-sites.com" target="_blank">salesforce-sites.com</a> .<a href="http://site.com" target="_blank">site.com</a> .<a href="http://sfdcopens.com" target="_blank">sfdcopens.com</a> .sfdc.sh .<a href="http://trailblazer.me" target="_blank">trailblazer.me</a> .<a href="http://trailhead.com" target="_blank">trailhead.com</a> .<a href="http://visualforce.com" target="_blank">visualforce.com</a><br>ssl_bump peek step2 allowed_https_sites <br>ssl_bump splice step3 allowed_https_sites <br>ssl_bump terminate step2 all<br><br><br>connect_timeout 60 minute<br>read_timeout 60 minute<br>write_timeout 60 minute<br>request_timeout 60 minute<br><br>## http filtering ###<br>#http_access allow localnet allowed_http_only<br>#http_access allow localhost allowed_http_only<br>http_access allow localnet allowed_https_sites<br>http_access allow localhost allowed_https_sites<br># And finally deny all other access to this proxy<br>http_access deny all<br><br># Uncomment and adjust the following to add a disk cache directory.<br>#cache_dir ufs /var/spool/squid 100 16 256<br><br># Leave coredumps in the first cache dir<br>coredump_dir /var/spool/squid<br><br>#<br># Add any of your own refresh_pattern entries above these.<br>#<br>refresh_pattern ^ftp: 1440 20% 10080<br>refresh_pattern ^gopher: 1440 0% 1440<br>refresh_pattern -i (/cgi-bin/|\?) 0 0% 0<br>refresh_pattern . 0 20% 4320<br><br><o:p></o:p></p></div><p class=MsoNormal>thanks<o:p></o:p></p></div></div></body></html>