Search squid archive

Re: transparent https question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 15/12/2013 9:19 p.m., Marcelo Barbudas wrote:
> Thanks for taking the time to answer Amos.
> 
> 
>> On port 443 traffic the Host: header is buried inside the encryption. So
>> is the whole URL. Until the server contact has been established, certs
>> exchanged with the client and the first HTTP request received there is
>> no known Host header.
>>
>> NP: the SSL cert domain name(s) can be wildcard or completely irrelevant
>> domain so is not reliable either.
>>
> 
> This gets me worried. Is what I'm trying to do possible? DNS spoof a
> domain (it's resolved to the squid server) and transparent proxy the
> https traffic to the real host?

Its possible and exactly what the bumping is designed to do. In your
case there just seems to be a problem connecting to the server to get
its cert details to base the forged cert around.


> 
> (as a general idea I don't care about the contents of https traffic,
> intercepting or otherwise, but because of the dns spoof I have to
> forward it to the real host)

Um. Is Squid being given the DNS-spoofed address or the real server
address to contact for fetching the real server cert ?


Amos




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux