Search squid archive

Re: Firefox update problems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



If you're accessing Squid as a transparent proxy, you can add in a
firewall rule to exclude the IP addresses of Mozilla's servers from
being redirected to Squid.

If you're using Squid as a direct proxy, you can add an SSL bump
exclusion in your squid.conf like so:

acl sslbump_exclusions dstdomain domain.you.want.to.exclude
ssl_bump none sslbump_exclusions

This will prevent Squid from attempting to decrypt the traffic after
the initial CONNECT request. Note that this assumes the clients using
Squid will send the domain in the CONNECT requests - if you want to
cover the clients that don't do this, use the 'dst' acl type instead:

acl sslbump_exclusions_ip dst 1.2.3.4
ssl_bump none sslbump_exclusions_ip

Nathan.
--
Nathan Hoad
Software Developer
www.getoffmalawn.com


On Tue, Jan 7, 2014 at 11:59 AM, Roman Gelfand <rgelfand2@xxxxxxxxx> wrote:
> I have an ssl bump setup with ssl_bump server-first all.
>
> When firefox is attempting an update, end user gets error "something
> is trying to trick firefox into accepting an insecure update".
>
> From what I gathered, unless I am wrong, firefox doesn't like when
> certificate changes in the middle.
>
> In any case, is there a way to deal with this either specifically
> bypassing ssl bump or something else?
>
> Thanks in advance




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux