Search squid archive

Re: SSL bump working on most site...cert pinning issue?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



No worries.

Sounds like this is the feature you should be waiting with baited breath for: http://wiki.squid-cache.org/Features/SslPeekAndSplice

I’m not a developer so I have no idea how far along that is right now.

On 30 Jun 2014, at 11:05 pm, James Lay <jlay@xxxxxxxxxxxxxxxxxxx> wrote:

> On Mon, 2014-06-30 at 22:56 +1000, Dan Charlesworth wrote:
>> Yeah, pinned SSL ‘aint gonna be bumped. The Twitter apps are another popular one that use pinning.
>> 
>> As far as your broken_sites ACL goes, you can’t use `dstdomain` because the only thing Squid can see of the destination before bumping an intercepted connection is the IP address. So for `ssl_bump none` you’ll need to be use `dst` ACLs instead.
>> 
>> ProTip: Here are the Apple and Akamai public IP blocks (to use in a dst equivalent of your broken_sites), respectively: 17.0.0.0/8, 23.0.0.0/12.
>> 
>> Good luck
>> 
>> On 30 Jun 2014, at 10:38 pm, James Lay <jlay@xxxxxxxxxxxxxxxxxxx> wrote:
>> 
>>> Topic pretty much says it...most sites work fine using my below set up,
>>> but some (Apple's app store) do not.  I'm wondering if cert pinning is
>>> the issue?  Since this set up is basically two separate sessions, I
>>> packet captured both.  The side the I have control over gives me a TLS
>>> Record Layer Alert Close Notify.  I am unable to decrypt the other side
>>> as the device in question is an iDevice and I can't capture the master
>>> secret.
>>> 
>>> I've even tried to ACL certain sites to not bump, but they don't go
>>> through.  Below is my complete setup.  This is running the below:
>>> 
>>> Squid Cache: Version 3.4.6
>>> configure options:  '--prefix=/opt' '--enable-icap-client'
>>> '--enable-ssl' '--enable-linux-netfilter'
>>> '--enable-follow-x-forwarded-for' '--with-large-files'
>>> '--sysconfdir=/opt/etc/squid'
>>> 
>>> 
>>> Any assistance with troubleshooting would be wonderful...thank you.
>>> 
>>> James
>>> 
>>> 
>>> 
>>> $IPTABLES -t nat -A PREROUTING -i eth0 -s 192.168.1.96/28 -p tcp --dport
>>> 80 -j REDIRECT --to-port 3128
>>> $IPTABLES -t nat -A PREROUTING -i eth0 -s 192.168.1.96/28 -p tcp --dport
>>> 443 -j REDIRECT --to-port 3129
>>> 
>>> 
>>> acl localnet src 192.168.1.0/24
>>> 
>>> acl SSL_ports port 443
>>> acl Safe_ports port 80		# http
>>> acl Safe_ports port 21		# ftp
>>> acl Safe_ports port 443		# https
>>> acl Safe_ports port 70		# gopher
>>> acl Safe_ports port 210		# wais
>>> acl Safe_ports port 1025-65535	# unregistered ports
>>> acl Safe_ports port 280		# http-mgmt
>>> acl Safe_ports port 488		# gss-http
>>> acl Safe_ports port 591		# filemaker
>>> acl Safe_ports port 777		# multiling http
>>> 
>>> acl CONNECT method CONNECT
>>> acl broken_sites dstdomain textnow.me
>>> acl broken_sites dstdomain akamaiedge.net
>>> acl broken_sites dstdomain akamaihd.net
>>> acl broken_sites dstdomain apple.com 
>>> acl allowed_sites url_regex "/opt/etc/squid/url.txt"
>>> acl all_others dst all
>>> acl SSL method CONNECT
>>> 
>>> 
>>> http_access deny !Safe_ports
>>> http_access deny CONNECT !SSL_ports
>>> 
>>> http_access allow manager localhost
>>> http_access deny manager
>>> 
>>> http_access allow allowed_sites
>>> http_access deny all_others 
>>> http_access allow localnet
>>> http_access allow localhost
>>> 
>>> http_access deny all
>>> icp_access deny all
>>> 
>>> sslproxy_cert_error allow broken_sites
>>> sslproxy_cert_error deny all
>>> 
>>> sslproxy_options ALL
>>> ssl_bump none broken_sites
>>> ssl_bump server-first all
>>> 
>>> http_port 192.168.1.253:3128 intercept 
>>> https_port 192.168.1.253:3129 intercept ssl-bump
>>> generate-host-certificates=on cert=/opt/sslsplit/sslsplit.crt
>>> key=/opt/sslsplit/sslsplitca.key options=ALL sslflags=NO_SESSION_REUSE
>>> 
>>> always_direct allow all
>>> 
>>> 
>>> hierarchy_stoplist cgi-bin ?
>>> 
>>> access_log syslog:daemon.info common
>>> 
>>> refresh_pattern ^ftp:		1440	20%	10080
>>> refresh_pattern ^gopher:	1440	0%	1440
>>> refresh_pattern -i (cgi-bin|\?)	0	0%	0
>>> refresh_pattern .		0	20%	4320
>>> 
>>> icp_port 3130
>>> 
>>> coredump_dir /opt/var
>>> 
>>> 
> 
> Ah good catch thank you.  I've seen expensive proxy appliances just
> tunnel the traffic through, but they get the host and domain name to all
> control...which is really all I'm wanting to do is control what sites
> are allowed.  I'll give your suggestions a go...thank you.
> 
> James
> 






[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux