Re: [RFC] [PATCH] Proposal to kill Netscape K-A hack

From: Amos Jeffries <squid3_at_treenet.co.nz>
Date: Fri, 10 Feb 2012 16:24:35 +1300

On 8/02/2012 8:23 p.m., Henrik Nordström wrote:
> ons 2012-02-08 klockan 11:40 +1300 skrev Amos Jeffries:
>> On 08.02.2012 07:53, Alex Rousskov wrote:
>>> On 02/07/2012 05:36 AM, Amos Jeffries wrote:
>>>> Just spotted this hack killing persistence after every Unsupported
>>>> Request error.
>>>> Original was added in Squid-2.3 prior to Oct 1999 for bugs in
>>>> Netscape.
>>>>
>>>> Anyone aware of this still needed?
>>> FWIW, I have not seen those warnings.
>> Popped up while testing the coap:// relay stuff. I expect its also
>> affecting urn:, wais:, whois: URI forwarding rejections. All rare cases.
> Not sure the code is ever reached. Is't in the default: fragment of a
> big switch handling most protocols.

"most" is the operative word there. For the few protocols like these new
ones which have no special server-side component (and so are only
supported as relayed to peers) the code is reached whenevr such a peer
is unavailable.

Nuked it.

Amos
Received on Fri Feb 10 2012 - 03:24:44 MST

This archive was generated by hypermail 2.2.0 : Fri Feb 10 2012 - 12:00:08 MST