[squid-users] range_offset_limit not working as expected
Amos Jeffries
squid3 at treenet.co.nz
Mon Sep 5 14:09:55 UTC 2016
What are you expecting?
The Squid native format access.log shows what was delivered to the
client, and what server was involved. It does not show how the
range_offset_limit directive affected the server connection messages.
The ORIGINAL_DST indicates that this is intercepted traffic.
Notice how the TCP_MISS transactions are rotating through different IP
addresses and using ORIGINAL_DST. That is usualy a sign that Host header
verification is unable to match the destination domain name with the
client contacted IP address on many transactions.
There is a mix of TCP_HIT/206 when that verification succeeds in its
matching.
Amos
More information about the squid-users
mailing list