Search squid archive

Re: HTTPS proxying

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



ons 2008-07-30 klockan 23:32 -0700 skrev Serge Egelman:

> I'm trying to set up squid to forward SSL connections.  I previously had 
> it set up just as logging proxy for conducting laboratory usability 
> studies (we would configure the browsers on our lab machines to use the 
> proxy, then I could check the logs afterwards to see where people were 
> going).  So I know it works for a minimal configuration.  I'm working on 
> a study now where I need to inject a self signed certificate into an SSL 
> session (I'm looking at warning messages), but can't seem to get squid 
> configured correctly (the idea is that we'll have the lab machines use 
> configured to use the proxy again).

To unwrap SSL and apply your own certificates when running as a proxy
you need the sslBump feature making Squid intercept CONNECT requests and
terminate the SSL locally. But it's unrelated from Squid opening the
port.

As you seem to have the SSL keys encrypted you need to either start
Squid interactively using the -N command line option, or tell Squid how
to retreive the SSL key encryption password by using the
ssl_password_program directive in squid.conf.

To avoid this most people keeps the keys unencrypted on the server to
avoid the administrative burden of having to enter the password on each
restart (including unplanned restarts..). To decrypt a encrypted key use
the following command:

  openssl rsa -in encrypted.pem -out unencrypted.pem

Regards
Henrik


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux