Search squid archive

Re: Bypassing SSL Bump for dstdomain

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 03/04/2013 10:11 PM, Amm wrote:

>> # Let user specify domains to avoid decrypting, such as internet banking
>> acl bump-bypass dstdomain .commbank.com.au 
>> ssl_bump none bump-bypass
>> ssl_bump server-first all 


> This will not work for intercepting traffic. Because domain is known
> only after SSL connection is established. So certificate stage etc
> has already passed.

It will work but only if the reverse DNS lookup for the intercepted IP
address works: ssl_bump supports slow ACLs, and dstdomain is a slow ACL
if given an IP address.


> You should try ACL check based on real IP or IP range. Ofcourse this
> assumes that IP will never change for those banks.

Agreed. And one can combine fast IP-based rules with slower reverse DNS
lookups, of course. Each approach has its own flaws.


> I am also assuming that squid checks IP based ACLs for ssl_bump
> before establishing connection with client.

Squid checks all ssl_bump ACLs before establishing a TCP connection with
the server. The TCP connection from the client is already accepted (or
intercepted) by the time ssl_bump ACL is checked.


> Or you need to create rules at firewall level which will *not* divert
> traffic for those sites to squid.

Agreed. That would be a better alternative to IP-based ssl_bump ACLs.


Thank you,

Alex.



[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux