On 22.11.2012 01:14, Rietzler, Markus (RZF, SG 324 /
<RIETZLER_SOFTWARE>) wrote:
> we are seeing the same erros in our cache_log
>
> On 12/11/2011 6:06 a.m., Alex Rousskov wrote:
>> On 11/10/2011 07:11 PM, Amos Jeffries wrote:
>>> On 11/11/2011 11:01 a.m., Alex Rousskov wrote:
>>>> Hello,
>>>>
>>>> I see thousands of these messages on busy caches:
>>>>
>>>>> 2011/11/07 05:16:23 kid1| client_side.cc(1573)
>>>>> keepaliveNextRequest:
>>>>> abandoning FD 6650
>>>>> 2011/11/07 05:16:27 kid3| client_side.cc(1573)
>>>>> keepaliveNextRequest:
>>>>> abandoning FD 9180
>>>>> 2011/11/07 05:16:28 kid5| client_side.cc(1573)
>>>>> keepaliveNextRequest:
>>>>> abandoning FD 6361
>>>>> 2011/11/07 05:16:28 kid6| client_side.cc(1573)
>>>>> keepaliveNextRequest:
>>>>> abandoning FD 3322
>>>>> 2011/11/07 05:16:31 kid2| client_side.cc(1573)
>>>>> keepaliveNextRequest:
>>>>> abandoning FD 7809
>>>>> 2011/11/07 05:16:32 kid3| client_side.cc(1573)
>>>>> keepaliveNextRequest:
>>>>> abandoning FD 121
>>>> The code says:
>>>>
>>>>> // XXX: Can this happen? CONNECT tunnels have deferredRequest
>>>>> set.
>>>>> debugs(33, DBG_IMPORTANT, HERE<< "abandoning"<<
>>>>> conn->clientConnection);
>>>> So, the answer to that XXX question is "yes, it can happen", at
>>>> least in
>>>> older v3.2 code. Does anybody know whether there were any recent
>>>> changes
>>>> that were meant to address the above?
>>> Yes the ConnStateData::stopReading() was moved to only happen when
>>> about
>>> to call tunnelStart() in client_side_request.cc instead of all
>>> CONNECT
>>> method requests.
>>>
>>> CONNECT assumes full control over the connection, but ssl-bump uses
>>> the
>>> ConnStateData.
>>
>> Understood. Since there were related changes, there is no need to
>> change
>> the verbosity of the message now. Let's see if those warnings are
>> still
>> there after they upgrade to more recent v3.2 releases.
>>
>>
>> Thank you,
>>
>> Alex.
>> P.S. The caches in question do not use SslBump AFAIK.
>
> there were also a discussion from may this year
>
>> tis 2012-05-01 klockan 08:09 -0500 skrev Guy Helmer:
>>> I'm working with code I obtained from Alex that was sync'ed with
>>> trunk as of -r12082 (2012-03-07 v3.2.0.16+) and on a very busy system
>>> doing forward HTTP and HTTPS proxy (but not sslBump), I am seeing
>>> lots of these messages:
>>>
>>> 2012/05/01 08:50:06 kid1| client_side.cc(1611)
>>> keepaliveNextRequest: abandoning local=10.10.0.4:3128
>>> remote=10.10.0.115:1409 FD 1113 flags=1
>>> 2012/05/01 08:50:28 kid1| client_side.cc(1611)
>>> keepaliveNextRequest: abandoning local=10.10.0.4:3128
>>> remote=10.10.0.125:1356 FD 1024 flags=1
>>> 2012/05/01 08:50:28 kid1| client_side.cc(1611)
>>> keepaliveNextRequest: abandoning local=10.10.0.4:3128
>>> remote=10.10.0.125:1357 FD 1220 flags=1
>>> 2012/05/01 08:50:31 kid1| client_side.cc(1611)
>>> keepaliveNextRequest: abandoning local=10.10.0.4:3128
>>> remote=10.10.0.125:1359 FD 1152 flags=1
>>>
>>> I see that there was a discussion back in November about this
>>> issue, but I am not understanding what the root cause is, and whether
>>> it is indicative of a serious problem. Any thoughts?
>>
>> It would be excellent if you could pair one or two such message with
>> the
>> network traffic taking place on the client connection (the client is
>> remote ip:port in the message).
>>
>> Regards
>> Henrik
>
>
> we are using squid 3.2.3 and also with the latest nightly build
> (squid-3.2.3-20121119-r11700).
>
> first we thought this error is some new strange behavior of squid
> under heavy load.
> after some testing we found one error cause:
>
> we are using ufdbguard, squid.conf:
>
> url_rewrite_program /rzf/produkte/www/bin/ufdbguard/ufdbgclient -e
> allow -C -l/rzf/produkte/www/files/ufdbguard/logs
>
>
> we see this error messages when there was a https-request which is
> blocked by ufdbguard.
Ah, in this case everything appears to be working exactly as designed.
... SSL-Bump is designed to pass the client a certificate representing
the server Squid is contacting.
... SSL is designed to warn the client when traffic is intercepted.
... URL-rewrite interface DOES NOT "block" anything. Ever.
All the URL helper interface to Squid (ie used by ufdbguard) does is
redirect (HTTP Status 30x) or alter the destination server (URL
re-write).
This second re-write action is a form of interception. As is SSL-Bump
interception. When you combine the two there are some behaviours which
are to be expected:
* Getting the certificate wrong when you re-write the URL on an HTTPS
URL is no more unexpected than getting HTML page URLs or Cookie domain
names wrong when re-writing HTTP URLs.
* server-first bumping is not possible when re-writing the URL to
contact a non-SSL HTTP, FTP, or Gopher server.
*please* do yourself a major favour and avoid *re-writing* URLs - 30x
redirect is fine fro almost all events and avoids all these problems and
more.
If you can't alter the re-writer to perform redirection you can work
around that by using:
acl foo ... some test to match the re-written URL ...
deny_info 302:%s foo
adapted_http_access deny foo
IFAIK ssl_bump_access can also use the 'foo' ACLs to determine
client-first bumping on the re-written URLs. That will only work on the
first CONNECT request though. Which again AFAIK, is the only point where
certificate issues like this can occur.
You could also workaround it by SSL-enabling your backend server
presenting the errors. That will change the connection errors to
domain-mismatch certificate errors at the client end but they will at
least be able to read the rejection page if they click through the cert
problems.
NOTE: passing the client request over an HTTP link after they connected
with HTTPS is technically a critical security vulnerability. There may
be any form of sensitive data in the request headers from the client
which were the reason for it being HTTPS in the first place.
> when ufdb blocks a request we do a redirect on a http-page to give
> the user an error response.
> with https-sites this does and can not work. the browser is expecting
> a correct ssl answer and waits to get the right ssl-certificate from
> the origin server, but our http-server does answer either with http
> and not https and the fqdn is not correct. so in the browser I only
> see a general "connection error" message, not our blocked script.
>
> this is the client side. in the cache_log we get
>
> 2012/11/21 13:09:40 kid1| client_side.cc(1602) keepaliveNextRequest:
> abandoning local=123.45.1.1:8080 remote=123.45.6.7:1988 FD 2247
> flags=1
>
>
> now the question to this long mail:
>
> are these errors harmless, do we have to care about them? we have
> really a lot of these messages.
> what about open connections, ssl tunnels/connects, ntlm and/or basic
> authentication handlers. are those connections all get closed
> cleanly....
They are both harmless and not harmless.
They are harmless to Squid and its operation - beyond the wasted CPU
cycles and bandwidth trying to cope with the issue.
They are harmful to to your service image. All these connection
failures are, as you note, visible to the clients AND occuring often.
Amos
Received on Thu Nov 22 2012 - 00:23:26 MST
This archive was generated by hypermail 2.2.0 : Fri Nov 30 2012 - 12:00:08 MST