Search squid archive

RE: [Squid 3.1.9] SSL Reverse PROXY - Insecure Renegotiation Supported

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> -----Original Message-----
> From: Sébastien WENSKE [mailto:sebastien@xxxxxxxxx]
> Sent: Monday, November 15, 2010 8:44 AM
> To: squid-users@xxxxxxxxxxxxxxx
> Subject:  [Squid 3.1.9] SSL Reverse PROXY - Insecure
> Renegotiation Supported
> 
> Hello guys,
> 
> I have set up a squid as SSL reverse proxy, it works very fine.
> 
> I have checked SSL security against Qualys and they report me that the
> server is vulnerable to MITM attacks because it supports insecured
> renegotiation
> 
> 
> There is my SSL relating configuration:
> 
> https_port xx.xx.xx.xx:443 cert=/etc/squid/ssl/RapidSSL_xxx.xxxxxxx.xx.crt
> key=/etc/squid/ssl/RapidSSL_xxx.xxxxxxx.xx.key options=NO_SSLv2 cipher=RSA:
> HIGH:!eNULL:!aNULL:!LOW:!RC4 RSA:!RC2 RSA:!EXP:!ADH  accel ignore-cc
> defaultsite=xxx.xxxxxxxx.xx vhost
> [...]
> cache_peer 10.x.x.x parent 80 0 front-end-https=on name=sw01 no-query
> originserver default login=PASS no-digest
> [...]
> ssl_unclean_shutdown on
> [...]
> 
> 
> Is it openssl related or squid configuration ????
> 
> 
> Many Thanks,
> 
> Sebastian

I have squid compiled from source against Openssl 1.0.0a, with the following options set:

https_port x.x.x.x:443 accel cert=xxx.crt key=xxx.key defaultsite=xxx.xxxx.xxx vhost options=NO_SSLv2 cipher=ALL:!aNULL:!eNULL:!LOW:!EXP:!ADH:!RC4+RSA:+HIGH:+MEDIUM:!SSLv2
sslproxy_options NO_SSLv2
sslproxy_cipher ALL:!aNULL:!eNULL:!LOW:!EXP:!ADH:!RC4+RSA:+HIGH:+MEDIUM:!SSLv2

It passes the entire test from our PCI (Payment Card Industry) site certification scans, the options and ciphers are set both on the https_port line and on individual lines, not sure if both or only one are required.

Thanks,
     Dean Weimer
     Network Administrator
     Orscheln Management Co




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux