Search squid archive

Re: transparent https question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks for taking the time to answer Amos.


> On port 443 traffic the Host: header is buried inside the encryption. So
> is the whole URL. Until the server contact has been established, certs
> exchanged with the client and the first HTTP request received there is
> no known Host header.
>
> NP: the SSL cert domain name(s) can be wildcard or completely irrelevant
> domain so is not reliable either.
>

This gets me worried. Is what I'm trying to do possible? DNS spoof a
domain (it's resolved to the squid server) and transparent proxy the
https traffic to the real host?

(as a general idea I don't care about the contents of https traffic,
intercepting or otherwise, but because of the dns spoof I have to
forward it to the real host)

> This looks a bit like the server is not permitting your connection
> attempt. The one that would otherwise give Squid the server cert and
> details to pass to the client.
> Is the server software running and listening on port 443 when this test
> is made?
>

Yes, I'm trying with https://google.com.

>
> You are testing from localhost? That is the only machine permitted
> through this Squid. Although you did get Connection Refused instead of
> 403 Forbidden.
>
Yes, I'm testing with localhost.

-M.




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux