[squid-users] Using tcp_outgoing_address with ACL

ngtech1ltd at gmail.com ngtech1ltd at gmail.com
Mon Jun 12 07:53:53 UTC 2023


Hey Ankor,

There is some missing context so I would be able to reproduce this issue.
Is this some kind of CONNECT request?

If you can describe in more technical details the setup and what client are you using,
Maybe couple sanitized log lines it would help to understand better the scenario.

Eliezer

From: squid-users <squid-users-bounces at lists.squid-cache.org> On Behalf Of Andrey K
Sent: Friday, June 9, 2023 10:03
To: Squid Users <squid-users at lists.squid-cache.org>; Amos Jeffries <squid3 at treenet.co.nz>
Subject: [squid-users] Using tcp_outgoing_address with ACL

Hello, 

We use the tcp_outgoing_address feature to access some hosts using a dedicated source IP address.

   acl domdst_SIProxy  dstdomain "/data/squid.user/etc/squid/categories/domdst_SIProxy"
   tcp_outgoing_address 10.72.235.129 domdst_SIProxy

It works fine, but logs are flooded with warnings like this:
   2023/06/09 08:30:07 kid2| WARNING: domdst_SIProxy ACL is used in context without an HTTP request. Assuming mismatch.

I found a similar case: http://lists.squid-cache.org/pipermail/squid-users/2015-January/001629.html where Amos suggested using a patch as a solution.
We have Squid Version 5.5. Is there a similar patch for our version, or can we just ignore these messages?

Kind regards,
       Ankor.



More information about the squid-users mailing list