Search squid archive

Reverse Proxy and SSL Bump: Advice and Questions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi everyone,

I’d like some advice regarding the using SSL Bump functionality with
Squid, and ask some questions regarding whether I correctly understand
what SSL Bump is designed to do.  First, however, I’d like describe
what I’m looking to do so you have some background.

At the moment, we have an older version of Squid which is working very
well as a Reverse Proxy for a number of sites in this configuration;

                                          +------------------+
                                          |                  |
                                          |                  |
Browser ----- HTTPS (SSL) Connection -----------+     +--------- HTTP
Connection ----- Web Server
                                          |     |     |      |
                                          |     A     B      |
                                          |                  |
                                          +------------------+
                                           Squid Reverse Proxy


Currently, we offload the SSL at the external interface of the Reverse
Proxy (as above (A)), so the Web browser connects to Squid and that's
where the SSL connection ends, for the rest of the journey to the web
server, the traffic is unencrypted (B).  This works for a fair
proportion of our sites and works well.  However, some of our web
based software is not coded very well and the requires an HTTPS
connection directly to the Web server.

Now, at the moment, this functionality is covered by a Microsoft TMG
instance which uses what they call 'SSL Bridging'.  For a number of
reasons, we now want to upgrade the Squid Reverse Proxy to 3.4 and
decommission the Microsoft TMG server, so my first question is this;
Does the SSL Bump functionality in Squid 3.4 replicate the SSL
Bridging process i.e. The client sends an encrypted request, Squid
then decrypts the request (A), encrypts it again (B), and forwards it
to the Web Server. The Web server returns the encrypted object to the
Squid server, decrypts the object (B), encrypts it again (A), and
sends it to the client.  This is shown below;
                                          +------------------+
                                          |                  |
                                          |                  |
Browser ----- HTTPS (SSL) Connection -----------+     +--------- HTTPS
(SSL) Connection ----- Web Server
                                          |     |     |      |
                                          |     A     B      |
                                          |                  |
                                          +------------------+
                                           Squid Reverse Proxy

Firstly, I'd just like to confirm that the functionality in SSL Bump
works as above and then I can decide how to go forward.  I am aware of
the ethical considerations of using this method and that effectively
it is just a 'managed' man-in-the-middle attack, but I can't really
think of any other way to get this to work without it.

Thanks everyone in advance, any help is appreciated.

John





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux