Search squid archive

Re: Re: Squid Reverse Proxy. Attempted connections to domains we do not host?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 5/09/2013 5:15 p.m., PSA4444 wrote:
Hi Amos,
We did not get a solution to this yet. The work around has been to disable http (port 80) and only run https (port
443) with a firewall in front of the proxy server.  This blocked out 100% of
these requests for now but I will need to re-enable it later.
How can I disable this open-proxy relaying?

Config:

###
visible_hostname domain.com https_port 443 accel cert=/usr/newrprgate/CertAuth/cert.cert
key=/usr/newrprgate/CertAuth/key.pem vhost defaultsite=www.domain.com
sslproxy_flags DONT_VERIFY_PEER

NOTE:
This flag is supported so that forward-proxyand interception proxy administrators can avoid having to register unlimited numbers of volatile self-signed CA for all the Internet websites their users encounter.

There should be no reason for it to be used in accelerator proxies - even with the backend server certificate(s) self-signed. The proxy just needs to be configured with the CA certificate(s) necessary to validate the upstream server. Since this is an accelerator the proxy the backends should be a well-defined set with the CA they require easily managed and configured.

The same thing goes for the sslflags=DONT_VERIFY_PEER on cache_peer lines. I have yet to see any reason beyond laziness for that cache_peer flag to be used since this is always a specific peer server with easily knowable CA. Doing SSL validation to the peers will help detect and prevent unexpected internal machines from being able to hijack the traffic, with auto-configuration on the network that is an important protection.

forwarded_for on
#Cache Peer 1
cache_peer one.domain.com parent 443 0 no-query originserver ssl
sslversion=3 connect-timeout=8 connect-fail-limit=2
sslflags=DONT_VERIFY_PEER front-end-https=on name=one login=PASSTHRU
acl sites_one dstdomain one.domain.com
cache_peer_access one allow sites_one
acl http proto http
acl https proto https
#Cache Peer 2
cache_peer two.domain.com parent 443 0 no-query originserver ssl
sslversion=3 connect-timeout=8 connect-fail-limit=2
sslflags=DONT_VERIFY_PEER front-end-https=on name=two login=PASSTHRU
acl sites_two dstdomain two.domain.com
cache_peer_access two allow sites_two
acl http proto http
acl https proto https

Since you already hasve sites one and sites_two configured for the cache_peer_access directives. They should be re-used in http_access allow lines to permit only the accelerated sites to be requested through the proxy.

Like so:
  http_access allow sites_one
  http_access allow sites_two
  http_access deny all

This resolves the open-proxy part and also enables Squid to handle a higher traffic load when DoS'ed with garbage-domain requests.

http_access allow all
header_replace Vary Accept-Encoding
request_header_access All allow all

You do not seem to have any header 'deny' rule for header_replace to work from - so it will do nothing.

"request_header_access All allow all" is the default. You can avoid CPU cycles processing requests through the header mangling component by removing these completely from the config.

Amos




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux