Search squid archive

Re: HTTPS intercept sent to cache_peer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 05/29/2013 04:40 AM, Amos Jeffries wrote:

> You cannot (yet) configure sending a CONNECT to peers because nobody has
> coded Squid to support that yet. 

I think it is worse: You can configure it, but it will not work in some
cases.


> There is some code in the very latest
> Squid (as in it literally just went into 3.HEAD yesterday) 

Do you mean "[PATCH] Support forwarding intercepted but not bumped
connections to cache_peers"? If yes, that proposed change is currently
awaiting squid-dev review and has not been committed yet. Comments and
testers welcome!


> to make
> failover send and handle CONNECT to peers when intercepted HTTPS goes
> badly. But that is only for intercepted SSL at present.

The pending patch is for handling non-bumped traffic so it does not
cover cases where something went wrong, only cases where the admin
configured Squid not to bump the intercepted [SSL] connection.

There are indeed many other cases here, and some of them do not seem to
work, but I have not studied that in detail as most early SslBump
adopters were not using cache peers. The whole problem space has about
18 cases:

  (port: forward or intercept) x
  (bump: client-first, server-first, or none) x
  (peer: direct, plain cache_peer, ssl cache_peer).

AFAIK, current Squid support includes: forward-none-direct,
forward-none-plain, and intercept-none-direct.

Our patch posted to squid-dev covers intercept-none-plain.

We are also working on covering forward-none-ssl.


Cheers,

Alex.





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux