Search squid archive

Capabilities of Squid as SSL MITM‏

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi
I am trying to set up squid as a transparent ssl mitm proxy. The 
users behind the proxy understand they have no expectation of privacy. 
Also each computer behind the proxy has trusted the organisation 
certificate.

After several days of research, what I would like to know is:
1. http_port intercept means squid will place its own ip in the packet sent to the destination. Is this correct?

2. http_port tproxy means squid will preserve the client's ip in the packet sent to the destination, is this correct?

3.
 Does ssl bump work only with CONNECT messages? ie clients must have 
their browser set to use squid as a proxy. But 
http://wiki.squid-cache.org/Features/SslBump also says it can mitm 
transparently redirected SSL traffic. So ssl bump works in 
'transparent/intercept' mode; I have seen many guides such as 
http://blog.davidvassallo.me/2011/03/22/squid-transparent-ssl-interception/
 combining ssl bump with transparent/intercept.

4. What is the 
point of using http_port (xyz) ssl-bump if port xyz cannot receive ssl 
traffic? Wouldn't ssl-bump ONLY be used with https_port, not http_port?

5.
 After all this, is it possible to use tproxy with ssl-bump? That is, do
 SSL man in the middle whilst preserving the client's IP address? The 
clients have all trusted the organisation CA that will be used by Squid.
 
http://squid-web-proxy-cache.1019090.n4.nabble.com/about-https-support-for-transparent-proxy-td1048478.html
 says it can't, but this message was from three years ago.

All of
 the examples I have seen use intercept with ssl-bump, not with tproxy. 
Or are there other options (squid or otherwise) which will allow 
transparent/tproxy ssl proxying?

Thanks 		 	   		  


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux