Search squid archive

Re: Reverse Proxy and SSL client side renegotiation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 8/05/2015 10:46 p.m., Jakob Curdes wrote:
> Hello all, I have configured squid 3.3.8 (CentOS 7 rpm) as an SSL
> reverse proxy which works fine. However, I would like to make it as
> secure as possible. The SSLLabs test showed
> "Secure Client-Initiated Renegotiation *Supported* *DoS DANGER* (more
> info
> <https://community.qualys.com/blogs/securitylabs/2011/10/31/tls-renegotiation-and-denial-of-service-attacks?_ga=1.161215733.973769323.1423134297>)"
> 
> 
> I found an old thread here where it was suggested it depends on the
> default of the OpenSSL library installed and that on compiling squid,
> you can disable this option by specifying SSL_OP_ALL=0. However I would
> like to stick to the RPM if possible.

Very old thread. Your version of Squid should already contain the
relevant change that would have caused.


> Is there a way to disable this via a configuration option? I tried to
> pass options=!ALL in the config but then no SSL conection is possible as
> the peers do not find any common cipher....

Er, yes. You have to follow !ALL with the explicit ':' or ',' separated
list of things which you do want to work.

The real answer though is to use an up to date OpenSSL version.

Amos

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux