mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-28 11:43:25 +02:00
squid: Update to 4.5
For details see: http://www.squid-cache.org/Versions/v4/changesets/ Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
This commit is contained in:
committed by
Michael Tremer
parent
13827014fc
commit
c86d893830
@@ -24,7 +24,7 @@
|
|||||||
|
|
||||||
include Config
|
include Config
|
||||||
|
|
||||||
VER = 4.4
|
VER = 4.5
|
||||||
|
|
||||||
THISAPP = squid-$(VER)
|
THISAPP = squid-$(VER)
|
||||||
DL_FILE = $(THISAPP).tar.xz
|
DL_FILE = $(THISAPP).tar.xz
|
||||||
@@ -42,7 +42,7 @@ objects = $(DL_FILE)
|
|||||||
|
|
||||||
$(DL_FILE) = $(DL_FROM)/$(DL_FILE)
|
$(DL_FILE) = $(DL_FROM)/$(DL_FILE)
|
||||||
|
|
||||||
$(DL_FILE)_MD5 = 892504ca9700e1f139a53f84098613bd
|
$(DL_FILE)_MD5 = 8275da5846f9f2243ad2625e5aef2ee0
|
||||||
|
|
||||||
install : $(TARGET)
|
install : $(TARGET)
|
||||||
|
|
||||||
@@ -72,10 +72,7 @@ $(subst %,%_MD5,$(objects)) :
|
|||||||
$(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
|
$(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
|
||||||
@$(PREBUILD)
|
@$(PREBUILD)
|
||||||
@rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar xaf $(DIR_DL)/$(DL_FILE)
|
@rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar xaf $(DIR_DL)/$(DL_FILE)
|
||||||
cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/squid/01_Fix_netdb_exchange_with_a_TLS_cache_peer_307.patch
|
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-4.5-fix-max-file-descriptors.patch
|
||||||
cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/squid/02_Maintenance_add_xz_tarball_format_formally_to_make_dist_325.patch
|
|
||||||
cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/squid/03_The_handshake_logformat_code_331.patch
|
|
||||||
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-4.4-fix-max-file-descriptors.patch
|
|
||||||
|
|
||||||
cd $(DIR_APP) && autoreconf -vfi
|
cd $(DIR_APP) && autoreconf -vfi
|
||||||
cd $(DIR_APP)/libltdl && autoreconf -vfi
|
cd $(DIR_APP)/libltdl && autoreconf -vfi
|
||||||
|
|||||||
@@ -1,91 +0,0 @@
|
|||||||
commit bc54d7a6f7ec510a25966f2f800d3ea874657546
|
|
||||||
Author: chi-mf <43963496+chi-mf@users.noreply.github.com>
|
|
||||||
Date: 2018-10-30 04:48:40 +0000
|
|
||||||
|
|
||||||
Fix netdb exchange with a TLS cache_peer (#307)
|
|
||||||
|
|
||||||
Squid uses http-scheme URLs when sending netdb exchange (and possibly
|
|
||||||
other) requests to a cache_peer. If a DIRECT path is selected for that
|
|
||||||
cache_peer URL, then Squid sends a clear text HTTP request to that
|
|
||||||
cache_peer. If that cache_peer expects a TLS connection, it will reject
|
|
||||||
that request (with, e.g., error:transaction-end-before-headers),
|
|
||||||
resulting in an HTTP 503 or 504 netdb fetch error.
|
|
||||||
|
|
||||||
Workaround this by adding an internalRemoteUri() parameter to indicate
|
|
||||||
whether https or http URL scheme should be used. Netdb fetches from
|
|
||||||
CachePeer::secure peers now get an https scheme and, hence, a TLS
|
|
||||||
connection.
|
|
||||||
|
|
||||||
diff --git a/src/icmp/net_db.cc b/src/icmp/net_db.cc
|
|
||||||
index 0f488de..526093f 100644
|
|
||||||
--- a/src/icmp/net_db.cc
|
|
||||||
+++ b/src/icmp/net_db.cc
|
|
||||||
@@ -1282,7 +1282,7 @@ netdbExchangeStart(void *data)
|
|
||||||
#if USE_ICMP
|
|
||||||
CachePeer *p = (CachePeer *)data;
|
|
||||||
static const SBuf netDB("netdb");
|
|
||||||
- char *uri = internalRemoteUri(p->host, p->http_port, "/squid-internal-dynamic/", netDB);
|
|
||||||
+ char *uri = internalRemoteUri(p->secure.encryptTransport, p->host, p->http_port, "/squid-internal-dynamic/", netDB);
|
|
||||||
debugs(38, 3, "Requesting '" << uri << "'");
|
|
||||||
const MasterXaction::Pointer mx = new MasterXaction(XactionInitiator::initIcmp);
|
|
||||||
HttpRequest *req = HttpRequest::FromUrl(uri, mx);
|
|
||||||
diff --git a/src/internal.cc b/src/internal.cc
|
|
||||||
index 6ebc7a6..ff7b4d6 100644
|
|
||||||
--- a/src/internal.cc
|
|
||||||
+++ b/src/internal.cc
|
|
||||||
@@ -82,7 +82,7 @@ internalStaticCheck(const SBuf &urlPath)
|
|
||||||
* makes internal url with a given host and port (remote internal url)
|
|
||||||
*/
|
|
||||||
char *
|
|
||||||
-internalRemoteUri(const char *host, unsigned short port, const char *dir, const SBuf &name)
|
|
||||||
+internalRemoteUri(bool encrypt, const char *host, unsigned short port, const char *dir, const SBuf &name)
|
|
||||||
{
|
|
||||||
static char lc_host[SQUIDHOSTNAMELEN];
|
|
||||||
assert(host && !name.isEmpty());
|
|
||||||
@@ -115,7 +115,7 @@ internalRemoteUri(const char *host, unsigned short port, const char *dir, const
|
|
||||||
static MemBuf mb;
|
|
||||||
|
|
||||||
mb.reset();
|
|
||||||
- mb.appendf("http://" SQUIDSBUFPH, SQUIDSBUFPRINT(tmp.authority()));
|
|
||||||
+ mb.appendf("%s://" SQUIDSBUFPH, encrypt ? "https" : "http", SQUIDSBUFPRINT(tmp.authority()));
|
|
||||||
|
|
||||||
if (dir)
|
|
||||||
mb.append(dir, strlen(dir));
|
|
||||||
@@ -132,7 +132,10 @@ internalRemoteUri(const char *host, unsigned short port, const char *dir, const
|
|
||||||
char *
|
|
||||||
internalLocalUri(const char *dir, const SBuf &name)
|
|
||||||
{
|
|
||||||
- return internalRemoteUri(getMyHostname(),
|
|
||||||
+ // XXX: getMy*() may return https_port info, but we force http URIs
|
|
||||||
+ // because we have not checked whether the callers can handle https.
|
|
||||||
+ const bool secure = false;
|
|
||||||
+ return internalRemoteUri(secure, getMyHostname(),
|
|
||||||
getMyPort(), dir, name);
|
|
||||||
}
|
|
||||||
|
|
||||||
diff --git a/src/internal.h b/src/internal.h
|
|
||||||
index c91f9ac..13a43a6 100644
|
|
||||||
--- a/src/internal.h
|
|
||||||
+++ b/src/internal.h
|
|
||||||
@@ -24,7 +24,7 @@ void internalStart(const Comm::ConnectionPointer &clientConn, HttpRequest *, Sto
|
|
||||||
bool internalCheck(const SBuf &urlPath);
|
|
||||||
bool internalStaticCheck(const SBuf &urlPath);
|
|
||||||
char *internalLocalUri(const char *dir, const SBuf &name);
|
|
||||||
-char *internalRemoteUri(const char *, unsigned short, const char *, const SBuf &);
|
|
||||||
+char *internalRemoteUri(bool, const char *, unsigned short, const char *, const SBuf &);
|
|
||||||
const char *internalHostname(void);
|
|
||||||
int internalHostnameIs(const char *);
|
|
||||||
|
|
||||||
diff --git a/src/peer_digest.cc b/src/peer_digest.cc
|
|
||||||
index 36a8705..f515aaa 100644
|
|
||||||
--- a/src/peer_digest.cc
|
|
||||||
+++ b/src/peer_digest.cc
|
|
||||||
@@ -323,7 +323,7 @@ peerDigestRequest(PeerDigest * pd)
|
|
||||||
if (p->digest_url)
|
|
||||||
url = xstrdup(p->digest_url);
|
|
||||||
else
|
|
||||||
- url = xstrdup(internalRemoteUri(p->host, p->http_port, "/squid-internal-periodic/", SBuf(StoreDigestFileName)));
|
|
||||||
+ url = xstrdup(internalRemoteUri(p->secure.encryptTransport, p->host, p->http_port, "/squid-internal-periodic/", SBuf(StoreDigestFileName)));
|
|
||||||
debugs(72, 2, url);
|
|
||||||
|
|
||||||
const MasterXaction::Pointer mx = new MasterXaction(XactionInitiator::initCacheDigest);
|
|
||||||
@@ -1,22 +0,0 @@
|
|||||||
commit 3c23ae8c7431344f8fc50bb5ee8f4b56d08c10a4
|
|
||||||
Author: Amos Jeffries <yadij@users.noreply.github.com>
|
|
||||||
Date: 2018-11-11 04:29:58 +0000
|
|
||||||
|
|
||||||
Maintenance: add .xz tarball format formally to make dist (#325)
|
|
||||||
|
|
||||||
Automake can now handle generating this format itself and the
|
|
||||||
experiments of providing it for downstream have gone well.
|
|
||||||
|
|
||||||
diff --git a/configure.ac b/configure.ac
|
|
||||||
index 3f8af6d..f668567 100644
|
|
||||||
--- a/configure.ac
|
|
||||||
+++ b/configure.ac
|
|
||||||
@@ -10,7 +10,7 @@ AC_PREREQ(2.61)
|
|
||||||
AC_CONFIG_HEADERS([include/autoconf.h])
|
|
||||||
AC_CONFIG_AUX_DIR(cfgaux)
|
|
||||||
AC_CONFIG_SRCDIR([src/main.cc])
|
|
||||||
-AM_INIT_AUTOMAKE([tar-ustar nostdinc subdir-objects])
|
|
||||||
+AM_INIT_AUTOMAKE([tar-ustar nostdinc subdir-objects dist-xz])
|
|
||||||
AC_REVISION($Revision$)dnl
|
|
||||||
AC_PREFIX_DEFAULT(/usr/local/squid)
|
|
||||||
AM_MAINTAINER_MODE
|
|
||||||
@@ -1,132 +0,0 @@
|
|||||||
commit 0022167d80725513d95b38aaebc90086fc0b6938 (tag: refs/tags/M-staged-PR331, refs/remotes/origin/v4)
|
|
||||||
Author: Christos Tsantilas <christos@chtsanti.net>
|
|
||||||
Date: 2018-11-14 15:17:06 +0000
|
|
||||||
|
|
||||||
The %>handshake logformat code (#331)
|
|
||||||
|
|
||||||
Logging client "handshake" bytes is useful in at least two contexts:
|
|
||||||
|
|
||||||
* Runtime traffic bypass and bumping/splicing decisions. Identifying
|
|
||||||
popular clients like Skype for Business (that uses a TLS handshake but
|
|
||||||
then may not speak TLS) is critical for handling their traffic
|
|
||||||
correctly. Squid does not have enough ACLs to interrogate most TLS
|
|
||||||
handshake aspects. Adding more ACLs may still be a good idea, but
|
|
||||||
initial sketches for SfB handshakes showed rather complex
|
|
||||||
ACLs/configurations, _and_ no reasonable ACLs would be able to handle
|
|
||||||
non-TLS handshakes. An external ACL receiving the handshake is in a
|
|
||||||
much better position to analyze/fingerprint it according to custom
|
|
||||||
admin needs.
|
|
||||||
|
|
||||||
* A logged handshake can be used to analyze new/unusual traffic or even
|
|
||||||
trigger security-related alarms.
|
|
||||||
|
|
||||||
The current support is limited to cases where Squid was saving handshake
|
|
||||||
for other reasons. With enough demand, this initial support can be
|
|
||||||
extended to all protocols and port configurations.
|
|
||||||
|
|
||||||
This is a Measurement Factory project.
|
|
||||||
|
|
||||||
diff --git a/src/cf.data.pre b/src/cf.data.pre
|
|
||||||
index fa8af56..a8ca587 100644
|
|
||||||
--- a/src/cf.data.pre
|
|
||||||
+++ b/src/cf.data.pre
|
|
||||||
@@ -4394,6 +4394,37 @@ DOC_START
|
|
||||||
<qos Server connection TOS/DSCP value set by Squid
|
|
||||||
<nfmark Server connection netfilter mark set by Squid
|
|
||||||
|
|
||||||
+ >handshake Raw client handshake
|
|
||||||
+ Initial client bytes received by Squid on a newly
|
|
||||||
+ accepted TCP connection or inside a just established
|
|
||||||
+ CONNECT tunnel. Squid stops accumulating handshake
|
|
||||||
+ bytes as soon as the handshake parser succeeds or
|
|
||||||
+ fails (determining whether the client is using the
|
|
||||||
+ expected protocol).
|
|
||||||
+
|
|
||||||
+ For HTTP clients, the handshake is the request line.
|
|
||||||
+ For TLS clients, the handshake consists of all TLS
|
|
||||||
+ records up to and including the TLS record that
|
|
||||||
+ contains the last byte of the first ClientHello
|
|
||||||
+ message. For clients using an unsupported protocol,
|
|
||||||
+ this field contains the bytes received by Squid at the
|
|
||||||
+ time of the handshake parsing failure.
|
|
||||||
+
|
|
||||||
+ See the on_unsupported_protocol directive for more
|
|
||||||
+ information on Squid handshake traffic expectations.
|
|
||||||
+
|
|
||||||
+ Current support is limited to these contexts:
|
|
||||||
+ - http_port connections, but only when the
|
|
||||||
+ on_unsupported_protocol directive is in use.
|
|
||||||
+ - https_port connections (and CONNECT tunnels) that
|
|
||||||
+ are subject to the ssl_bump peek or stare action.
|
|
||||||
+
|
|
||||||
+ To protect binary handshake data, this field is always
|
|
||||||
+ base64-encoded (RFC 4648 Section 4). If logformat
|
|
||||||
+ field encoding is configured, that encoding is applied
|
|
||||||
+ on top of base64. Otherwise, the computed base64 value
|
|
||||||
+ is recorded as is.
|
|
||||||
+
|
|
||||||
Time related format codes:
|
|
||||||
|
|
||||||
ts Seconds since epoch
|
|
||||||
diff --git a/src/format/ByteCode.h b/src/format/ByteCode.h
|
|
||||||
index ad230bb..a6f8fd9 100644
|
|
||||||
--- a/src/format/ByteCode.h
|
|
||||||
+++ b/src/format/ByteCode.h
|
|
||||||
@@ -46,6 +46,8 @@ typedef enum {
|
|
||||||
LFT_CLIENT_LOCAL_TOS,
|
|
||||||
LFT_CLIENT_LOCAL_NFMARK,
|
|
||||||
|
|
||||||
+ LFT_CLIENT_HANDSHAKE,
|
|
||||||
+
|
|
||||||
/* client connection local squid.conf details */
|
|
||||||
LFT_LOCAL_LISTENING_IP,
|
|
||||||
LFT_LOCAL_LISTENING_PORT,
|
|
||||||
diff --git a/src/format/Format.cc b/src/format/Format.cc
|
|
||||||
index c1e19b4..8fd6720 100644
|
|
||||||
--- a/src/format/Format.cc
|
|
||||||
+++ b/src/format/Format.cc
|
|
||||||
@@ -8,6 +8,7 @@
|
|
||||||
|
|
||||||
#include "squid.h"
|
|
||||||
#include "AccessLogEntry.h"
|
|
||||||
+#include "base64.h"
|
|
||||||
#include "client_side.h"
|
|
||||||
#include "comm/Connection.h"
|
|
||||||
#include "err_detail_type.h"
|
|
||||||
@@ -547,6 +548,24 @@ Format::Format::assemble(MemBuf &mb, const AccessLogEntry::Pointer &al, int logS
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
|
|
||||||
+ case LFT_CLIENT_HANDSHAKE:
|
|
||||||
+ if (al->request && al->request->clientConnectionManager.valid()) {
|
|
||||||
+ const auto &handshake = al->request->clientConnectionManager->preservedClientData;
|
|
||||||
+ if (const auto rawLength = handshake.length()) {
|
|
||||||
+ // add 1 byte to optimize the c_str() conversion below
|
|
||||||
+ char *buf = sb.rawAppendStart(base64_encode_len(rawLength) + 1);
|
|
||||||
+
|
|
||||||
+ struct base64_encode_ctx ctx;
|
|
||||||
+ base64_encode_init(&ctx);
|
|
||||||
+ auto encLength = base64_encode_update(&ctx, buf, rawLength, reinterpret_cast<const uint8_t*>(handshake.rawContent()));
|
|
||||||
+ encLength += base64_encode_final(&ctx, buf + encLength);
|
|
||||||
+
|
|
||||||
+ sb.rawAppendFinish(buf, encLength);
|
|
||||||
+ out = sb.c_str();
|
|
||||||
+ }
|
|
||||||
+ }
|
|
||||||
+ break;
|
|
||||||
+
|
|
||||||
case LFT_TIME_SECONDS_SINCE_EPOCH:
|
|
||||||
// some platforms store time in 32-bit, some 64-bit...
|
|
||||||
outoff = static_cast<int64_t>(current_time.tv_sec);
|
|
||||||
diff --git a/src/format/Token.cc b/src/format/Token.cc
|
|
||||||
index 186ade5..06c60cf 100644
|
|
||||||
--- a/src/format/Token.cc
|
|
||||||
+++ b/src/format/Token.cc
|
|
||||||
@@ -141,6 +141,7 @@ static TokenTableEntry TokenTableMisc[] = {
|
|
||||||
TokenTableEntry("<qos", LFT_SERVER_LOCAL_TOS),
|
|
||||||
TokenTableEntry(">nfmark", LFT_CLIENT_LOCAL_NFMARK),
|
|
||||||
TokenTableEntry("<nfmark", LFT_SERVER_LOCAL_NFMARK),
|
|
||||||
+ TokenTableEntry(">handshake", LFT_CLIENT_HANDSHAKE),
|
|
||||||
TokenTableEntry("err_code", LFT_SQUID_ERROR ),
|
|
||||||
TokenTableEntry("err_detail", LFT_SQUID_ERROR_DETAIL ),
|
|
||||||
TokenTableEntry("note", LFT_NOTE ),
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
--- configure.ac.~ Wed Apr 20 14:26:07 2016
|
--- configure.ac.~ Wed Apr 20 14:26:07 2016
|
||||||
+++ configure.ac Fri Apr 22 17:20:46 2016
|
+++ configure.ac Fri Apr 22 17:20:46 2016
|
||||||
@@ -3156,6 +3156,9 @@
|
@@ -3160,6 +3160,9 @@
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
@@ -10,7 +10,7 @@
|
|||||||
dnl --with-maxfd present for compatibility with Squid-2.
|
dnl --with-maxfd present for compatibility with Squid-2.
|
||||||
dnl undocumented in ./configure --help to encourage using the Squid-3 directive
|
dnl undocumented in ./configure --help to encourage using the Squid-3 directive
|
||||||
AC_ARG_WITH(maxfd,,
|
AC_ARG_WITH(maxfd,,
|
||||||
@@ -3186,8 +3189,6 @@
|
@@ -3190,8 +3193,6 @@
|
||||||
esac
|
esac
|
||||||
])
|
])
|
||||||
|
|
||||||
Reference in New Issue
Block a user