fix(squid): block direct IP connections that bypass domain filtering#1160
fix(squid): block direct IP connections that bypass domain filtering#1160
Conversation
Add Squid ACLs to deny CONNECT requests targeting raw IPv4 and IPv6 addresses. Without this, an attacker could bypass domain-based filtering by connecting directly to an IP address using HTTPS. Fixes #137 Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
✅ Coverage Check PassedOverall Coverage
📁 Per-file Coverage Changes (1 files)
Coverage comparison generated by |
Build Test: Bun Results ✅
Overall: PASS Bun v1.3.10
|
🦀 Rust Build Test Results
Overall: ✅ PASS
|
|
Smoke test results — Claude (
Overall: PASS
|
Smoke Test Results — Copilot Engine✅ GitHub MCP: Last 2 merged PRs: Overall: PASS
|
Build Test: Deno ✅
Overall: PASS Test output detailsoak:
|
.NET Build Test Results
Overall: PASS Run outputhello-world:
|
Build Test: Node.js ✅
Overall: PASS
|
Go Build Test Results ✅
Overall: PASS
|
|
PRs reviewed: fix(security): eliminate TOCTOU race conditions in ssl-bump.ts; fix(security): stop logging partial token values
|
Java Build Test Results ☕
Overall: ✅ PASS Both projects compiled and all tests passed successfully.
|
Chroot Version Comparison Results
Result: FAILED — Python and Node.js versions differ between host and chroot environments.
|
C++ Build Test Results
Overall: PASS ✅
|
Summary
dst_ipv4,dst_ipv6) to deny CONNECT requests targeting raw IP addresses (both IPv4 and IPv6)Details
When a client connects directly to an IP address using HTTPS (e.g.,
curl -k https://140.82.114.4/), Squid sees only the IP in the CONNECT request with no domain to match against the ACL. This change explicitly denies such requests at the Squid level, complementing the existing host-level iptables default-deny rule.Test plan
Fixes #137
🤖 Generated with Claude Code