Search squid archive

Transparent SSL proxy w/ client-side certificates (rephrased)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello again.  I apologize for the duplicate topic but I've hit a dead end.
I'm hoping that a simpler question will be easier to answer so here goes:

Is it possible to transparently proxy TLS traffic through Squid when the
target server requires a client-side certificate for authentication?


This works as expected when Squid is operating in non-transparent mode.
When I switch to transparent mode, however, Squid doesn't request a
certificate from the client and as a result the server-side handshake fails.
(Standard SSL traffic flows correctly after I accept the name mismatch
complaints from the browser.)


I've tried to understand the handshake process but I can't determine if it's
possible to transparently proxy this or if Squid just doesn't support it at
the moment.  Specifically, it seems that CertificateVerify requires the
client to sign a message to show it possesses the private key associated
with the provided certificate.  This doesn't seem inconsistent with
transparent proxying, as Squid could simply impersonate the target server,
collect the signature from the client, and relay it back to the server.  Or
am I missing something obvious?



Thanks in advance,

Damon

<<attachment: smime.p7s>>


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux