Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Rob Sheldon (robassociatedtechs.com)
Date: Sun Jun 02 2013 - 04:17:46 CDT
Sorry for the noise.
OpenBSD 5.3 introduced Squid 3.2, which now checks the destination IP
of inbound packets against the Host: header in interception mode. This
breaks rdr-to, which makes nearly every howto online incorrect (joy).
There was a minor error in the Squid docs which confused me (http_port
must have IP-of-interface-to-listen on:port, e.g., "http_port
127.0.0.1:3129 intercept", instead of just "http_port 3129 intercept" as
in the current docs), which caused the connection refused errors, which
I stupidly misinterpreted.
FWIW, the Squid docs link to
which have "http_port 127.0.0.1:3129 transparent" as the example, but
as of Squid 3.1, "transparent" was deprecated in favor of "intercept":
[__ Robert Sheldon
[__ No Problem
[__ Information technology support and services
[__ (530) 575-0278