fre 2007-06-15 klockan 10:44 +0500 skrev rihad:
> Here's an example of one typical erroneous TCP stream flow processed by
> Ethereal/Wireshark, and shown here in all its ASCII glory. Any tips
> appreciated.
>
>
> ........|.2.|....j.s....|..?|..=...K.H...~..|....Z.#|....v..|<.m.........n.G.t...J...p.1.f...........(.I.^.....5.:.....a.V.O.......[...y.N...T.e.*.3.P...F...............>.W.............6.....-.....x.......4..|
> ...0...&._.l.]...k....|..........C|..!.........r..|X.9...g...%.......Q.....L...b.....i....|..U...........o....|R2{|8.............S.........,...B.+|...|..w|d......|`.........M.2.........'........|...|.....0}.".....).....D.....c.@.A.../.|.....;...Y......
>
> E.......q............
> HTTP/1.0 400 Bad Request
> Server: squid/2.6.STABLE13
> Date: Wed, 13 Jun 2007 08:45:51 GMT
> Content-Type: text/html
> Content-Length: 1180
> Expires: Wed, 13 Jun 2007 08:45:51 GMT
> X-Squid-Error: ERR_INVALID_REQ 0
> X-Cache: MISS from cache.net
> Via: 1.0 cache.net:8080 (squid/2.6.STABLE13)
> Proxy-Connection: close
Are you running transparent interception? I would guess so.
The above indicates there is some application on your network trying to
use the HTTP port 80 for non-HTTP traffic. And Squid being and HTTP
proxy dislikes seeing non-HTTP traffic sent to it.
Regards
Henrik
This archive was generated by hypermail pre-2.1.9 : Sun Jul 01 2007 - 12:00:04 MDT