If that's the case, would there be any possible way for me to get the decrypted packets? On Feb 5, 2012, at 2:37 PM, James R. Leu wrote: > I do not have sslbump working yet, but as I understand it the packets > on the wire are always encrypted. The only place the information exists > in a decrypted form is in squids memory. Just think of squid as a bridge > between two SSL streams. > > On Sun, Feb 05, 2012 at 02:12:44PM -0500, PS wrote: >> I tried using ssldump and tshark and I can't seem to get this working. I am using squid's private key to try to decrypt the traffic. >> >> The connection goes from the client (192.168.2.2) to squid server (192.168.2.1) on port 3128. If I understand correctly, the client establishes a connection with squid on port 3128 and then squid establishes a connection with https://www.gmail.com on port 443. >> >> Shouldn't I be able to decrypt the connection between the client and the squid server in order to see the traffic that is being sent to gmail? >> >> On Feb 3, 2012, at 2:08 PM, "Alfonso Alejandro Reyes Jimenez" <aareyes@xxxxxxxxxxxxx> wrote: >> >>> Sorry. SSLDUMP is like tcpdump but for ssl, it Works on layer 3 and has nothing to do with squid, that what we use. >>> >>> Regards. >>> >>> >>> >>> -----Mensaje original----- >>> De: PS [mailto:packetstack@xxxxxxxxx] >>> Enviado el: viernes, 03 de febrero de 2012 12:56 p.m. >>> Para: Alfonso Alejandro Reyes Jimenez >>> CC: squid-users@xxxxxxxxxxxxxxx >>> Asunto: Re: Capturing HTTPS traffic >>> >>> Could you please be a little more specific? Is there something else called ssldump that I am supposed to use? >>> >>> This is what my config looks like. I am currently using ssl_bump. >>> >>> >>> acl localnet src 10.0.0.0/8 # RFC1918 possible internal network >>> acl localnet src 172.16.0.0/12 # RFC1918 possible internal network >>> acl localnet src 192.168.0.0/16 # RFC1918 possible internal network >>> acl localnet src fc00::/7 # RFC 4193 local private network range >>> acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines >>> acl SSL_ports port 443 >>> acl Safe_ports port 80 # http >>> acl Safe_ports port 21 # ftp >>> acl Safe_ports port 443 # https >>> acl Safe_ports port 70 # gopher >>> acl Safe_ports port 210 # wais >>> acl Safe_ports port 1025-65535 # unregistered ports >>> acl Safe_ports port 280 # http-mgmt >>> acl Safe_ports port 488 # gss-http >>> acl Safe_ports port 591 # filemaker >>> acl Safe_ports port 777 # multiling http >>> acl CONNECT method CONNECT >>> http_access allow localhost manager >>> http_access deny manager >>> http_access deny !Safe_ports >>> http_access deny CONNECT !SSL_ports >>> http_access allow localnet >>> http_access allow localhost >>> http_access deny all >>> http_port 3128 ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=4MB cert=/usr/local/squid/ssl_cert/squid.pem >>> always_direct allow all >>> ssl_bump allow all >>> sslproxy_cert_error allow all >>> sslproxy_flags DONT_VERIFY_PEER >>> coredump_dir /usr/local/squid/var/cache/squid >>> refresh_pattern ^ftp: 1440 20% 10080 >>> refresh_pattern ^gopher: 1440 0% 1440 >>> refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 >>> refresh_pattern . 0 20% 4320 >>> logformat squid %ts.%03tu %6tr %>a %Ss/%03>Hs %<st %rm %ru %un %Sh/%<A %mt access_log /usr/local/squid/var/logs/access.log squid >>> >>> Thanks for the quick response! >>> >>> On Feb 3, 2012, at 1:20 PM, Alfonso Alejandro Reyes Jimenez wrote: >>> >>>> Hi. >>>> >>>> If you have the certifícate information you may use ssldump to decode the information. I hope this helps. >>>> >>>> >>>> Regards. >>>> >>>> -----Mensaje original----- >>>> De: PS [mailto:packetstack@xxxxxxxxx] Enviado el: viernes, 03 de >>>> febrero de 2012 12:11 p.m. >>>> Para: squid-users@xxxxxxxxxxxxxxx >>>> Asunto: Capturing HTTPS traffic >>>> >>>> Hello, >>>> >>>> I am currently running the following version of Squid: >>>> >>>> Squid Cache: Version 3.2.0.14-20120202-r11500 configure options: '--enable-ssl' '--enable-ssl-crtd' >>>> >>>> I configured it so that certs are generated on the fly and I am able to get to HTTPS websites without getting a certificate warning. >>>> >>>> I want to do a packet capture of all HTTPS traffic while in cleartext. I would think that it can be done on the Squid box. Is that possible? >>>> >>>> If I use tcpdump on the Squid box, I only see the encrypted traffic. Do I have to recompile Squid with another configuration option to be able to do what I want to do? >>>> >>>> Thanks >>> > > -- > James R. Leu > jleu@xxxxxxxxxxxxxx