Search squid archive

Re: Bypassing SSL Bump for dstdomain

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





----- Original Message -----
> From: Alex Rousskov <rousskov@xxxxxxxxxxxxxxxxxxxxxxx>
> To: "squid-users@xxxxxxxxxxxxxxx" <squid-users@xxxxxxxxxxxxxxx>
> Cc: 
> Sent: Wednesday, 6 March 2013 6:20 AM
> Subject: Re:  Bypassing SSL Bump for dstdomain
> 
> On 03/04/2013 10:11 PM, Amm wrote:
> 
>>>  # Let user specify domains to avoid decrypting, such as internet 
> banking
>>>  acl bump-bypass dstdomain .commbank.com.au 
>>>  ssl_bump none bump-bypass
>>>  ssl_bump server-first all 
> 
> 
>>  This will not work for intercepting traffic. Because domain is known
>>  only after SSL connection is established. So certificate stage etc
>>  has already passed.
> 
> It will work but only if the reverse DNS lookup for the intercepted IP
> address works: ssl_bump supports slow ACLs, and dstdomain is a slow ACL
> if given an IP address.

As per http://www.squid-cache.org/Doc/config/acl/ ; its a fast ACL.

acl aclname dstdomain   .foo.com ...
    # Destination server from URL [fast]

Also depending on reverse lookup for bypassing ssl_bump is can be
insecure w.r.t. policy. Rare but still somewhat insecure.


>>  I am also assuming that squid checks IP based ACLs for ssl_bump
>>  before establishing connection with client.
> 
> Squid checks all ssl_bump ACLs before establishing a TCP connection with
> the server. The TCP connection from the client is already accepted (or
> intercepted) by the time ssl_bump ACL is checked.

What I would like to know is, does squid check ssl_bump ACL before starting
SSL connection with client OR after? (for intercepting on https_port)

Otherwise ssl_bump server-first OR none feature does not help much.

Regards,

Amm.




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux