Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions src/cf.data.pre
Original file line number Diff line number Diff line change
Expand Up @@ -2984,9 +2984,6 @@ DOC_START
to the client original destination instead of DIRECT.
This overrides 'client_dst_passthru off'.

For now suspicious intercepted CONNECT requests are always
responded to with an HTTP 409 (Conflict) error page.


SECURITY NOTE:

Expand Down
3 changes: 1 addition & 2 deletions src/client_side_request.cc
Original file line number Diff line number Diff line change
Expand Up @@ -389,8 +389,7 @@ void
ClientRequestContext::hostHeaderVerifyFailed(const char *A, const char *B)
{
// IP address validation for Host: failed. Admin wants to ignore them.
// NP: we do not yet handle CONNECT tunnels well, so ignore for them
if (!Config.onoff.hostStrictVerify && http->request->method != Http::METHOD_CONNECT) {
if (!Config.onoff.hostStrictVerify) {
debugs(85, 3, "SECURITY ALERT: Host header forgery detected on " << http->getConn()->clientConnection <<
" (" << A << " does not match " << B << ") on URL: " << http->request->effectiveRequestUri());

Expand Down