On 2014-02-25 22:17, kannan rbk wrote:
In our office, we are using squid to restrict users to connect only particular web sites and urls. If a user is connecting a web page via https, url_regex acl will not work. In a https request, we have control over domain only. But we need to restrict on url level. So, we used ssl bump to intercept the https requests. Its working fine, but we got some ssl warnings in browser. Google Chrome Warning Cannot connect to the real ziopert.com Is this possible to intercept a ssl connection in bump without any browser warnings?
Only if you have a CA certificate installed in that browser AND if the browser accepts your CA for that website. Chrome are taking a hard-line stance on TLS being secure, rather than the loophole mess ssl-bump takes advantage of.
You could try upgrading your proxy and using http://wiki.squid-cache.org/Features/BumpSslServerFirst. That might improve your situation a little, but there is not much hope as SSL was designed to its core to detect third-parties accessing the encryption.
Amos