Search squid archive

Re: squid + icap for recording ssl data for forensic analysis.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/20/2010 04:35 AM, Roberto Martelloni wrote:

i have readed that in the roadmap of squid 3.3 will be available dynamic
ssl cert hijacking.

I'm interested in this functionality plus icap module to record all ssl
session for network forensic analysis, post incident.

Do you think is possible to use squid + sslbump + icap/ecap to write
down in an structured way all the ssl data forwarded by the proxy ?

anyone have any suggestion or experience in this kind of utilization, or
icap/ecap functionality cant be used for this purpose ? is it out of the
scope ?

What you want is indeed possible. Some caveats:

(a) ICAP/eCAP are not related to SslBump in any way. Those APIs do not know where the traffic is coming from and whether it was encrypted at some point or will be encrypted later. Knowing which pieces are independent may help you understand the overall architecture better. You will need an ICAP or eCAP adapter to record traffic. It is fairly easy to write a simple one though.

(b) Dynamic SSL Certificate Generation does not work with transparent proxies at this time, and there is currently no project to add such functionality. Doing so would require a serious development effort.

(c) While there is an outdated patch adding Dynamic SSL Certificate Generation to Squid v3.1, there is currently no project to update that code. I am optimistic that we will do it within two months, but I cannot promise anything. Synchronizing and committing that patch to trunk is required to get the feature into v3.2 or v3.3.

HTH,

Alex.


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux