Search squid archive

Re: Using squid as transparent proxy causes problem with pages on https

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12.04.2012 06:16, Ahmed Talha Khan wrote:
Hey Amos,

I am not talking about the port 443 https. lets talk about port 80
ssl/http. I have configured the ip-tables correctly to re-direct my
traffic to squid.Now how will the ssl_bump feature behave when
configured as transparent. For me it was not working and is the
problem.

Fine. CONNECT is a client->proxy request method, used on port 3128 (http-proxy service). They should never exist on port-80 (http-server service). So there is nothing for ssl-bump to do there either.


ssl-bump feature simply unwraps a CONNECT request internal TLS layer. Which limits its usefulness to traffic situations where CONNECT exist:


* when the browser is aware of and sending traffic to the proxy of its own choice...
   via regular TCP:  http_port + ssl-bump
   via TLS tunnel:   https_port + ssl-bump


* when the intercepted traffic was destined to another proxy (intercepted port 3128 traffic etc)
   via regular TCP:  http_port + intercept + ssl-bump
   via TLS tunnel:   https_port + intercept + ssl-bump


* some various edge case like when you intercept a client who is violating HTTP with invalid CONNECT requests on port 80, or to a proxy configured on the port.


I think the confusing thing seems to be that ssl-bump is a *valid* option on both port types and both intercept and forward modes. So we can't provide helpful "invalid parameter" messages from -k parse to make the usage cases clearer.


It is identical in external behaviour to the old config hack of URL-rewriting CONNECT endpoint IP:port URI back to a local Squid https_port. Just far more efficient.

Amos



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux