Search squid archive

RE: SslBump and bad cert

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 25 May 2011 16:16:54 +0000, Ming Fu wrote:
>> It is too late to alter the client certificate. By the time a server
>> connection is opened Squid may have already served replies out of
cache
>> to the client.
>
> I am a bit surprised. Can sslbump make some https content cacheable?

Why surprised? ssl-bumps' purpose is to remove the SSL layer on
arriving
traffic.

  The data inside is just HTTP and gets handled same as any other.
Caching, filtering, alterations. Anything goes once the security layer
is erased.


This does make me worried. For a web developer writing an https only site, He wouldn't bother with cache control headers the same as when he is develop
http site. The https itself implies private to sharing. I would
expect sslbump
perverse this privacy in dealing with https traffic.


Ming


Sadly this is not new. Same problem happens in HTTP. Some webmaster jumps on "no-cache" or "no-store" instead of "private". Sets it site wide instead of just the personal pages. Proxy admin see a site forcing constant reloads on static images that don't ever change, set a site-wide ignore-nocache. Everything goes sour.

All SSL does is verify that the other endpoint is trusted or not by the particular client. This is why ssl-bump feature only works in LAN situations where the proxy CA can be installed on worker PCs. Reverse-proxy have always done the mirror image of bump, where the website cert can be installed on each edge proxy https_port and signed by a major CA that everybody trusts. LAN which want to bump have always been able to setup their own reverse-proxy with DNS records and MITM the HTTPS.

Amos



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux