Dear Squid users, I want your experts solution for having squid proxy server configured in the cloud. What I am planning to do is : ---[LAN]-----[local_squid_proxy]----{internet cloud}---------[squid proxy in cloud Amazon EC2 ] what I want to setup is configure my local squid proxy with cache_peer pointing to my squid proxy server in Amazon EC2 cloud. cache_peer proxy.amazonec2.com parent 3128 3130 default so that all my http request are forwarded from my local squid_proxy to the proxyserver in the cloud. Can anyone suggest me if above situation workable. Thank you in advance. -----Original Message----- From: Fried Wil [mailto:wilfried.pascault@xxxxxxxxx] Sent: Wednesday,22 February , 2012 2:56 PM To: squid-users@xxxxxxxxxxxxxxx Subject: Re: Re: NTLM auth for RPC over HTTPS to outlook everywhere Hi Clem, Did you test CAS Server as Frontal just to test NTLM authentication less Reverse proxy ? User --> FW --> NAT@CAS Server and not User --> FW --> NAT@Reverseproxy --> CAS Server Just to test NTLM Authentication mecanism if it will be ok Thx On Wed, Feb 22, 2012 at 12:33:09PM +0100, Clem wrote: > Hi Fried, > > I know all this links !! :), but As you I've made squid to work like a > charm in front of my exchange for owa activesync and RPC too ... in > basic auth, not in NTLM auth, and I still stuck there. > > Impossible to find a solution to make a linux front-end, neither with > squid nginx apach or pound ! That's it ! I think I'll give up. > > BTW Thx ! > > -----Message d'origine----- > De : Fried Wil [mailto:wilfried.pascault@xxxxxxxxx] > Envoyé : mercredi 22 février 2012 11:26 À : > squid-users@xxxxxxxxxxxxxxx Objet : Re: Re: NTLM auth > for RPC over HTTPS to outlook everywhere > > Hi Clem, > > I have test OWA RPC HTTPS and .. > > Apache => fail. Apache sees this as a security leak. This is a raw > explanation :-). The problem is how apache and Exchange RPC use http > 1.1 . Microsoft let bigger package pass over http 1.1. > > Check these links : > https://issues.apache.org/bugzilla/show_bug.cgi?id=40029 > http://forum.nginx.org/read.php?2,3511 > http://httpd.apache.org/security/vulnerabilities_20.html > http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088 > > Squid as RP => OK. I have the final configuration. If u're > interessted, tell me and i'll send u the squid.conf > > Nginx => Not tested but I think it will be the same as Apache ... > > Regards, > > Wilfried > > On Wed, Feb 22, 2012 at 11:19:31AM +0100, Clem wrote: > > Hello, > > > > Coming back after weeks of researches, gave up with squid, tried > > with > pound > > and nginx reverse proxy, and same issue, and the point is (getting > > it from numbers of hints and searches in forums): > > > > For pound (from a user in forum): > > > > ---------- POUND ------------ > > I looked into this when I first started using pound. This is a > > rather simplified explanation of what I discovered (and could be > > completely wrong - I don't know enough about RPC or HTTP). When > > Outlook sends the first HTTP request it specifies a content-length > > of 1GB. I think this is so the request stays open and RPC commands > > get sent via this "tunnel". Pound (being the good proxy that it is) > > sits and waits for the 1GB of data to arrive and does not pass the > > request to the BE until it does. Pound eventually times out waiting > > for the promised 1GB of data and gives up. > > > > Here's Microsoft's details of the protocol: > > http://technet.microsoft.com/en-us/library/aa995784(EXCHG.65).aspx > > http://technet.microsoft.com/en-us/library/aa996706(EXCHG.65).aspx > > ---------- END POUND -------------- > > > > For NGINX (in logs) : > > > > ----------- NGINX ------------ > > > > 2012/02/21 17:19:31 [error] 17072#0: *6 client intended to send too > > large > > body: 1073741824 bytes, client: x.x.x.x, server: mail.xx.fr, request: > > "RPC_IN_DATA /rpc/rpcproxy.dll?localmail.fr:6002 HTTP/1.1", host: > > "mail.xx.fr" > > > > ---------- END NGINX ----------- > > > > IMHO, it's exactly the same issue I had with squid and rpc over > > https with NTLM ... > > > > Hope that can help, I'm now completely stucked ! > > > > Regards > > > > Clémence > > > > > > > > > > > > -----Message d'origine----- > > De : Clem [mailto:clemfree@xxxxxxx] Envoyé : jeudi 26 janvier 2012 > > 13:12 À : 'squid-users@xxxxxxxxxxxxxxx' > > Objet : RE: Re: NTLM auth for RPC over HTTPS to > > outlook everywhere > > > > On se second "anormal" I've sent, the certificate is sent. > > The auth works on basic, I think the certificate is OK, however it > > would > be > > rejected, isn't it ? > > > > -- ANORMAL2 (SQUID) -- > > > > 2 0.001415 192.168.3.15 192.168.1.10 TCP https > > > 33043 [SYN, ACK] Seq=0 Ack=1 Win=16384 Len=0 MSS=1460 WS=0 TSV=0 > > TSER=0 > > SACK_PERM=1 > > 3 0.001457 192.168.1.10 192.168.3.15 TCP 33043 > > > https [ACK] Seq=1 Ack=1 Win=5856 Len=0 TSV=81334043 TSER=0 > > 4 0.002583 192.168.1.10 192.168.3.15 TLSv1 Client > > Hello > > 5 0.003850 192.168.3.15 192.168.1.10 TLSv1 Server > > Hello, Certificate, Server Hello Done > > 6 0.003887 192.168.1.10 192.168.3.15 TCP 33043 > > > https [ACK] Seq=96 Ack=933 Win=7712 Len=0 TSV=81334044 TSER=23422065 > > 7 0.007140 192.168.1.10 192.168.3.15 TLSv1 Client > > Key Exchange, Change Cipher Spec, Encrypted Handshake Message > > 8 0.042683 192.168.3.15 192.168.1.10 TLSv1 Change > > Cipher Spec, Encrypted Handshake Message > > 9 0.043505 192.168.1.10 192.168.3.15 TLSv1 > > Application Data > > > > -- ANORMAL2 (SQUID) END -- > > > > > > -----Message d'origine----- > > De : Amos Jeffries [mailto:squid3@xxxxxxxxxxxxx] Envoyé : jeudi 26 > > janvier 2012 12:24 À : squid-users@xxxxxxxxxxxxxxx Objet : Re: > > Re: NTLM auth for RPC over HTTPS to outlook everywhere > > > > On 26/01/2012 11:55 p.m., Clem wrote: > > > Amos and Isenberg, > > > > > > For me, ntlm is not an option, I have to make it working, cause > > > all my clients are in ntlm on outlook, especially the external > > > ones. And that worked without squid, and I want that can work with it at frond end. > > > > > > I've sniffed the sequence on working ntlm auth and not working > > > (squid) > > auth > > > (192.168.3.15 is exchange serv, 192.168.1.134 my IP on direct > > > RPCoHTTPS, > > and > > > 192.168.1.10 squid server redirecting from an external ip): > > > > Aha. Some use yes. It seems to confirm that the supported SSL > > encryption types are probably the problem. > > > > The packets you call "NORMAL" the client connects, server accepts > > that and hands over its certificate. > > > > The packets you call "ANORMAL" the client connects, the server > > indicates a encryption change, the client accepts and sends the > > requst in new form. The server certificate is apaprently not involved. > > > > You can probably drill down into those packets with "Change Cipher Spec" > > to see more about what is going on. Search engine is likely to be > > more help than me for the details you find. > > > > Amos > > > > > > > > -- NORMAL --- > > > > > > 2 0.000377 192.168.3.15 192.168.1.134 TCP > https> > > > 26701 [SYN, ACK] Seq=0 Ack=1 Win=16384 Len=0 MSS=1460 SACK_PERM=1 > > > 3 0.000428 192.168.1.134 192.168.3.15 TCP > 26701> > > > https [ACK] Seq=1 Ack=1 Win=64240 Len=0 > > > 4 0.000992 192.168.1.134 192.168.3.15 TLSv1 > Client > > > Hello > > > 5 0.002007 192.168.3.15 192.168.1.134 TLSv1 > Server > > > Hello, Certificate, Server Hello Done > > > 6 0.002642 192.168.1.134 192.168.3.15 TLSv1 > Client > > > Key Exchange, Change Cipher Spec, Encrypted Handshake Message > > > 7 0.035230 192.168.3.15 192.168.1.134 TLSv1 > Change > > > Cipher Spec, Encrypted Handshake Message > > > 8 0.036034 192.168.1.134 192.168.3.15 TLSv1 > > > Application Data > > > > > > -- NORMAL END --- > > > > > > -- ANORMAL (SQUID) -- > > > > > > 2 0.000529 192.168.3.15 192.168.1.10 TCP > https> > > > 47552 [SYN, ACK] Seq=0 Ack=1 Win=16384 Len=0 MSS=1460 WS=0 TSV=0 > > > TSER=0 > > > SACK_PERM=1 > > > 3 0.000560 192.168.1.10 192.168.3.15 TCP > 47552> > > > https [ACK] Seq=1 Ack=1 Win=5856 Len=0 TSV=81027244 TSER=0 > > > 4 0.001248 192.168.1.10 192.168.3.15 TLSv1 > Client > > > Hello > > > 5 0.002110 192.168.3.15 192.168.1.10 TLSv1 > Server > > > Hello, Change Cipher Spec, Encrypted Handshake Message > > > 6 0.002140 192.168.1.10 192.168.3.15 TCP > 47552> > > > https [ACK] Seq=128 Ack=123 Win=5856 Len=0 TSV=81027244 TSER=23409792 > > > 7 0.002869 192.168.1.10 192.168.3.15 TLSv1 > Change > > > Cipher Spec, Encrypted Handshake Message > > > 8 0.003423 192.168.1.10 192.168.3.15 TLSv1 > > > Application Data > > > > > > -- ANORMAL (SQUID) END -- > > > > > > I hope that can help you, as I can see there is a difference when > > > the exchange server answer Hello, but I can't understand more ... > > > > > > Regards > > > > > > Clémence > > > > > > -----Message d'origine----- > > > De : Isenberg, Holger [mailto:isenberg@xxxxxxxxxxxx] Envoyé : > > > jeudi 26 janvier 2012 11:01 À : squid-users@xxxxxxxxxxxxxxx Objet > > > : RE: Re: NTLM auth for RPC over HTTPS to outlook > > > everywhere > > > > > > I'm wondering if NTLM would work at all with any non-ISA proxy for > Outlook > > > Anywhere. After reading > > > > > > http://www.sysadminlab.net/exchange/outlook-anywhere-basic-vs-ntlm-aut > hentic > > > ation-explained I'll stay with Basic Auth and when using it over > > > https I don't see any reason for not doing. Of course when all > > > your traffic to > the > > > Exchange https connector goes over squid, even on the local > > > network, > then > > > you have a reason to use single sign-on login methods, but for > > > that in > our > > > local network clients can connect directy to Exchange. > > > > > > > > > > > > > > >