Search squid archive

Re: Transparent SSL Interception

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



You might want to look at
http://bugs.squid-cache.org/show_bug.cgi?id=2976. There was a
quick-fix which caused even more problems. This is a  hard-coded value
that causes all requests to be forcibly written to "http" even
"https". You can reverse it via this patch
http://bugs.squid-cache.org/attachment.cgi?id=2375.

It should work.

The pain was all mine to debug it ;)


-talha


On Tue, Apr 24, 2012 at 3:03 PM, Neil <nwilson123@xxxxxxxxx> wrote:
> Hi guys and girls,
>
> I've been trying to setup a "transparent"(from the users side) SSL
> interception proxy, I realise this isn't advised as it's breaks SSL and
> voids any user privacy etc, but this is for a school that needs to be able
> to monitor and control social networking access for students and we've been
> asked to come up with a solution.
>
> The students bring in their own devices IPADS/tablets etc and these get
> assigned an IP via DHCP, port 443 and port 80 are then re-directed(using
> iptables) to squid.
>
> I'm using squid(3.1.19) with --enable-ssl and --enable-icap-client as well
> as all the usual options, my transparent HTTP proxying works perfectly so
> it's only the SSL side that doesn't work the way I've envisaged it would.
> EG: the proxy intercepts all SSL traffic and acts as the users PC would
> normally, and any certificate errors are hidden from the users device,
> because certain apps(apple.com) etc don't allow the users to accept
> certificate warnings.
>
> These are the relevant options from my squid.conf
>
> http_port 192.168.0.1:8080 intercept ssl-bump
> cert=/etc/squid/ssl_cert/squid.pem key=/etc/squid/ssl_cert/squid.pem
> https_port 192.168.0.1:8081 intercept
> cert=/etc/squid/ssl_cert/squid.pem key=/etc/squid/ssl_cert/squid.pem
>
> always_direct allow all
>
> acl broken_sites dstdomain .absa.co.za
> ssl_bump deny broken_sites
> ssl_bump allow all
>
> # ignore errors with certain cites (very dangerous!)
> acl TrustedName url_regex ^https://ib.absa.co.za/
> sslproxy_cert_error allow TrustedName
> sslproxy_cert_error deny all
>
> # ignore certain certificate errors (very dangerous!)
> acl BadSite ssl_error SQUID_X509_V_ERR_DOMAIN_MISMATCH
> sslproxy_cert_error allow BadSite
> sslproxy_cert_error deny all
>
> The above might have word wrapped a bit.
>
>
> I've tried varying options like re-directing port 443 to my http_port and
> using "transparent" instead of "intercept", using "ssl-bump" on both the
> http_port and https_port as well as a whole ton of other options but nothing
> seems to make much of a difference. The best I can do is get https facebook
> to work transparently, but then I have major problems with most other SSL
> sites, the banking sites either complain about "redirecting in a way that
> will never finish" or they direct to another page which I'm guessing the
> remote webserver picks up some kind of SSL error and doesn't allow you to
> get in. As you can see in my config, I've tried to force "absa.co.za" to
> work no matter what happens but the ACLs haven't made any difference.
>
> Please could anyone provide me with some guidance, I seem to be going round
> in circles here.
>
> Thank you.
>
> Regards.
> Neil Wilson.



-- 
Regards,
-Ahmed Talha Khan



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux