Search squid archive

RE: SslBump and bad cert

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Alex,

One question about sslbump implementation, was the client side cert exchange done before squid start the ssl to the server? If so, it might be too late when squid learns that the server cert is not good. The client side cert was already sent out.

If the client side cert was exchanged after the server side, I am willing to experiment with the openssl to see if purposefully sign a flawed cert is possible.

Ming

-----Original Message-----
From: Alex Crow [mailto:alex@xxxxxxxxxxxxxxx] 
Sent: Tuesday, May 24, 2011 12:25 PM
To: Ming Fu
Cc: squid-users@xxxxxxxxxxxxxxx
Subject: Re:  SslBump and bad cert

E.g. if the server cert has expired, sign an expired squid cert to the 
browser. At least this will reproduce the same behavior as if the 
sslbump is not turned on. The browser will warn the certificate problem 
and the user can proceed at his own risk. The squid administrator can be 
kept out of the loop in dealing with not so well maintained server 
certificate.
> Regards,
> Ming
>

Sounds like it could work, but I don't know with openssl if it's even 
possible to generate a cert that has already expired!

Alex



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux