Search squid archive

Re: Default ssl-bump that works with chrome/opera

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
 


05.09.15 18:30, Xen пишет:
> On 09/05/2015 02:22 PM, Rafael Akchurin wrote:
>> Hello Xen,
>>
>> The certificate warning was most probably indeed caused by default
SHA-1 signature of the mimicked certificate in stock version of Squid
present by default in popular Linux distribs. Latest version does that
correctly and your "not private" connection warnings in Chrome/etc is
now gone.
>>
>> Please see
http://docs.diladele.com/faq/filtering/chrome_not_private.html - I tried
to explain it clearly.
>> Please note this is may also be caused by your trusted root
certificates expiring in 2017+.
>>
>> Hope other members of the list know better the cipher set. I am very
interested in this too.
>>
>> Best regards,
>> Rafael Akchurin
>> Diladele B.V.
>
> Thank you mr. Diladele. Actually when I first ran into this I was
using your packaged version of Squid on Windows. I just couldn't get it
working, although I had a wrong certificate (generated in a different
way on Debian) at first and I didn't notice. But after that was fixed,
if I remember correclty, I still had the problems with Opera and Chrome.
>
> I have no clue what changed now to remove this problem. Maybe my
memory is incorrect of this.
>
> The Diladele Squid, of course, was a version 3.5
>
> But if you say the SHA1 warning created the Invalid Certificate
warning (as you indicate) then perhaps I am mistaken about my Windows
problems now. In any case I upgraded and now it seems to work :).
>
> Regards...
>
>
>>
>> -----Original Message-----
>> From: squid-users [mailto:squid-users-bounces@xxxxxxxxxxxxxxxxxxxxx]
On Behalf Of Xen
>> Sent: Saturday, September 5, 2015 1:58 PM
>> To: squid-users@xxxxxxxxxxxxxxxxxxxxx
>> Subject:  Default ssl-bump that works with chrome/opera
>>
>> Hey,
>>
>> Might I perhaps ask.
>>
>> Currently with the default minimum configuration for ssl-bump that is
advocated everywhere, my Firefox bumping works but Chrome and Opera are
more strict and will say my certificate is invalid.
>>
>> The certificate was simply generated (self-signed) with openssl x509
with no additional options for cipher or message digest or whatever.
>> Browsers typically complain that the certificate was signed using an
insecure hash (sha1). I don't know if this is the result of my own
certificate or whether it is the result of what Squid does to it using
the regen it does.
All you need just re-generate your proxy CA with right options. Look at
the examples:

# SHA1 signing
openssl req -x509 -new -nodes -config D:\OpenSSL-Win64\bin\openssl.cfg
-key rootCA.key -days 10950 -out rootCA.crt
# SHA256 signing
openssl req -x509 -sha256 -new -nodes -config
D:\OpenSSL-Win64\bin\openssl.cfg -key rootCA.key -days 10950 -out rootCA.crt

# High grade:
openssl genrsa -out rootCA.key 3072
openssl req -x509 -sha512 -new -nodes -config
D:\OpenSSL-Win64\bin\openssl.cfg -key rootCA.key -days 10950 -out rootCA.crt

# Highest grade:
openssl genrsa -out rootCA.key 4096
openssl req -x509 -sha512 -new -nodes -config
D:\OpenSSL-Win64\bin\openssl.cfg -key rootCA.key -days 10950 -out rootCA.crt


>>
>> Actually Chromium works fine now, I don't know why that change. I had
so many problems with it.
>>
>> In fact, I don't know what happened. Both Chromium and Opera now work.
>>
>> I did upgrade to 3.5.7 but I tested after.
>>
>> All browsers mostly complain about using obsolete cipher suites though.
>>
>> So that is the question I wanted to ask: Is there a default SSL
configuration for Squid that will limit or reduce or do away with those
obsolete cipher questions and remarks?
Feel free to read Squid wiki. :)

http://wiki.squid-cache.org/ConfigExamples/Intercept/SslBumpExplicit#Hardening

>>
>> I have been trying to find configs on the web, but they go into great
technical detail about those ciphers and also require you to make
difficult choices you can't make until and unless you are a security expert.
>>
>> I believe going from RSA to ECDHE_ECDSA (or something similar) will
do the trick. But I also read here about Squid supporting something only
in version 4.
>>
>> Even typing that word makes me sick. ECDHE_ECDSA buh.
>>
>> Does it have to be anything more difficult :P.
>>
>> Is there a smallest subset SSL configuration for Squid that will
simply reduce those messages and allow the level of security of the
original site not to go down as much? I would think that Squid doesn't
communicate with that server any different than it does with me. So the
whole chain is now using something less than it did before.
>>
>> So that is my question: give me 3 lines of code (or configuration)
that will allow this?
>>
>> I beg of you :p :).
>>
>> Regards, X.
>> _______________________________________________
>> squid-users mailing list
>> squid-users@xxxxxxxxxxxxxxxxxxxxx
>> http://lists.squid-cache.org/listinfo/squid-users
>
> _______________________________________________
> squid-users mailing list
> squid-users@xxxxxxxxxxxxxxxxxxxxx
> http://lists.squid-cache.org/listinfo/squid-users

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
 
iQEcBAEBCAAGBQJV6ueKAAoJENNXIZxhPexG3tIH/RrrcT5IMnYb3tuPqNs1PfCu
Fj6tpYGbC9g/VS5Iv8DAe4xV27PcLXdG2+RLUrEM3/8OLxb0pDfDdCHLKU9ZsXZS
2TI3sjkXAVFjSJDRt1JMBGQRY/DYp6cLMNfrkyeBvPVr8psopI/haoGUBX1y0eot
Bo+ULvxNAdksIiFLt6ecY9wUBDyUO/iUKztC+Mg73fsjqh28JyD55aCrKldNs2Es
iXdJvypEjk7xz/aBoesi1T/xJb/P2U0Vv0oD9leDx05tlPdutK0L/O8YkTrUl7Zt
8xpj2pXwptT9w76aGNuQ3mfxFypoEJYzv5rKaC3CMC67ROF6FqFrKBnN+FtKJ5c=
=wOcF
-----END PGP SIGNATURE-----

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux