Search squid archive

Re: SSL Peak and Splice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On May 13, 2015 at 3:25 AM Amos Jeffries <squid3@xxxxxxxxxxxxx> wrote:
>
>
> On 13/05/2015 6:17 a.m., Casey Daniels wrote:
> > Hi,
> > I've been trying to figure out how to do some web filtering on HTTPs,
> > with no really good options given the layout I have. But then I just
> > happened to see this feature for Squid 3.5, and was wondering if I'm
> > understanding it correctly.
> >
> > With the Peak and Splice feature, is it possible to run squid in a
> > transparent mode for SSL, and check for certain host and either deny the
> > connection all together or allow the connection without further
> > interference from Squid? Would this be completely transparent without
> > adding a trusted certificate from the proxy server to all user devices?
>
> Depends on how you define "host" and what the TLS ClientHello
> information contains.
>
> If you define "host" in the official standard Internet terminology (a
> single machine). Then no its not possible. NAT and "load balancing"
> utterly destroyed the ability to determine if the host being spoken to
> is the host indicated in the packets.
> Case in point is your interceptor - a completely different host to the
> one the client sees in its packets. Nothing stops other interceptors
> existing upstream from you.
>
> If by "host" you actally meant FQDN or host *name*. It can be done when
> and only when the TLS SNI information is made available by the client.
>
> Amos
>

Yes the second option, not the particular machine, but the FQDN (i.e. www.cooking.com)
When is the TLS SNI information made available by the client? 
 
Casey
_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users

[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux