Search squid archive

Re: ssl_bump and SNI

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 4/06/2015 6:29 p.m., sp_ wrote:
>  Hello Amos,
> 
> thank you for your reply.
> 
> Let's take for instance this line:
> 
> 192.168.78.31 - - [04/Jun/2015:09:41:22 +0300] "CONNECT 173.194.122.233:443 HTTP/1.1" 200 0 "-" "-" TCP_DENIED:HIER_NONE
> 
> 
> I have dumped the traffic passing through the interface on the router during this request.
> In client hello in Extension "server_name" I can see the domain:
> 
> Server Name: clients4.google.com

In your packet trace look at the details in the TCP SYN packet *only* to
see what the Squid CONNECT has available.

> 
> 
> According to RFC, domain is a must in Client Hello, when SNI is used.

Yes. But the ClientHello is not part of a TCP SYN packet - which is what
Squid is working with when it does that fake CONNECT message processing.

The TLS packets have explicitly not been read into Squid yet in case
splice, none, or terminate actions are to be done by the ssl_bump step1
rules.


If the bumping is successful there will be other requests from inside
the TLS that get logged with the domain etc.

For now Squid does not log any of the SSL-bumping process itself. There
is an open bug about that now.

Amos

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users





[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux