Search squid archive

RE: SSL Accel - Reverse Proxy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Tony,

	You can try something like this.

acl port443 port 443
acl SAFE_ports port 443 #https
https_port 443 accel vhost vport defaultsite=www.mywebsite.com
cache_peer [backend webserver IP] parent 443 0 no-query originserver ssl
login=PASS name=httpsWeb
acl ourWebSite dstdomain www. mywebsite.com 
cache_peer_access httpsWeb allow ourWebSite



> -----Original Message-----
> From: Tory M Blue [mailto:tmblue@xxxxxxxxx]
> Sent: Thursday, May 01, 2008 11:21 AM
> To: squid-users@xxxxxxxxxxxxxxx
> Subject: Re:  SSL Accel - Reverse Proxy
> 
> On Thu, May 1, 2008 at 2:02 AM, Amos Jeffries <squid3@xxxxxxxxxxxxx>
> wrote:
> >
> >  You could make a second peer connection using HTTPS between squid
and
> the
> > back-end server and ACL the traffic so that only requests coming in
via
> SSL
> > are sent over that link. Leaving non-HTTPS incoming going over the
old
> HTTP
> > link fro whatever the server want to do.
> >
> Thanks Amos
> 
> Not sure that I made myself clear or that I understand your
suggestion.
> 
> I need to allow squid to connect and talk to my servers via http
> (only), i want squid to handle the SSL termination (SSL acceleration,
> take the overhead off the back end servers).
> 
> However since squid talks to the back end servers via http (and not
> https on pages that require https), I need to somehow tell the server
> that the original connection, or the connection that will go back to
> the client will be https, even though the server is responding via
> http..
> 
> I handle secure and non secure fine now, the same website for example.
> apps.domain.com, listens to both 443 and 80, so squid can handle
> secure and non secure. there is code on apps.domain.com that checks
> the incoming protocol to verify that's it's secure, if not it sends a
> secure url for the client to come back in on.  As you can see if I
> allow Squid to handle the SSL portion, the back end server has no way
> of knowing (the piece I'm missing) if the actual client connection is
> secure or not. (hard to explain possibly)..
> 
> Client ----> apps.domain.com (443) <Squid> ---------> backend server
(80)
> backend server (80)  ------> <Squid> apps.domain.com (443) ---------->
> Client (443)
> 
> I'm wondering if Squid can tell the peer (server) that the original
> request was in fact secure, so that we can tell the application, feel
> free to respond with the secure data via non secure port, because
> squid will encrypt the server response and get back to the client via
> https
> 
> Sorry kind of long winded.
> Tory


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux