Search squid archive

Re: intercepting SSL connections with client certificate

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/19/2013 06:39 AM, Shinoj Gangadharan wrote:

> 1. sslbump is not passing on the client cert - I think this will be fixed
> with SSLPeekandSplice feature
> (http://wiki.squid-cache.org/Features/SslPeekAndSplice)

I do not think this can be "fixed". IIRC, Squid cannot forward the
client certificate to the server on a bumped connection: During SSL
handshake, the client certificate is sent along with a digest of SSL
messages seen by the client so far. That digest is encrypted with the
client private key. Squid would not be able to create that digest
because Squid does not have access to the client private key and the
client digest will not match the server view of the communication. This
is one of the defense layers against the man-in-the-middle attack.

Just like Squid cannot forward the server certificate to the client,
Squid cannot forward the client certificate to the server. If a
connection is bumped, both certificates can only be faked, not
forwarded "as is".

Squid does not support faking client certificates.


> 2. Plain old cache_peer is not working with SSL due to this bug(this is my
> guess) : "There is a bug in Squid where it can not forward CONNECT
> requests properly to ssl enabled peers." By Henrik from :
> http://squid-web-proxy-cache.1019090.n4.nabble.com/Transparent-SSL-Interce
> ption-td4582940.html

I am not sure exactly which problem you are referring to, but TCP
tunnels to SSL peers are unofficially supported in
https://code.launchpad.net/~measurement-factory/squid/connect2ssl


HTH,

Alex.





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux