Search squid archive

Re: SSL3_READ_BYTES:sslv3 alert certificate unknown

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/28/2015 08:09 AM, Yuri Voinov wrote:

> At a minimum, it should write the information on them in the log - in
> an understandable form

I suspect everybody agrees with that statement. I am sure this will be
implemented eventually. No need to argue about that.

Alex.



> 28.10.15 19:55, Amos Jeffries пишет:
>> On 28/10/2015 11:57 p.m., Yuri Voinov wrote:
>>>
>>>
>>> 28.10.15 16:47, Amos Jeffries пишет:
>>>> On 28/10/2015 11:35 p.m., Yuri Voinov wrote:
>>>>> Hi gents.
>>>>>
>>>>> I think, all of you who use Bump, seen much this messages in your
>>>>> cache.log.
>>>>>
>>>>> SSL3_READ_BYTES:sslv3 alert certificate unknown
>>>>>
>>>>> AFAIK, no way to identify which CA is absent in your setup.
>>>>>
>>>>> I propose to consider the following questions: how do properly support
>>>>> SSL proxy, if you can not identify the problem certificates? Telepaths
>>>>> sunbathing in Bali. The procedure, which currently can not quickly and
>>>>> in any way to effectively determine such a certificate.
>>>>>
>>>>> At the moment, the situation is as follows. SSL library - a thing in
>>>>> itself, it runs by itself and does not write any logs. Squid - itself
>>>>> and any useful information on the library does not receive but obscure
>>>>> diagnostic messages. The possibility in any way specify the SSL library
>>>>> diagnostic messages we have, and, as I understand it, will not.
>>>>>
>>>>> So, any ideas?
>>>> Make sure Squid is sending the whole CA chain to the remote end?
>>> I think so, "From the remote end". If we have web-server with CA, which
>>> is not exists on our proxy, we must install it (which means "trust
>>> them", yea?) in our proxy manually.
>>>
>>> I have idiotic idea - Squid fetch remote CA and offer us to trust and
>>> install interactively. :) This is, of course, clinically idiotism. :)
>>>
> 
>> That is what the Browsers do. It has been suggested to write a cert
>> validator that does it too.
> 
> 
>>> But - to support real Squid installation with thoursands users, I really
>>> want to know, which CA's not exists from my side.
>>>
>>> Intermediate CA's is no matter - if we have root CA already, fetch
>>> intermediate chain is not big problem.
>>>
>>> In this case, however, we faced unknown root CA exactly.
>>>
>>> Yes?
> 
>> I doubt. Chains do not have length limits and IIRC you can't know that
>> it is a root CA until you actually have it and see that it is
>> self-signed. At which point it is not "certificate unknown" anymore.
> 
>> What is missing is just some CA in the chain. It needs to be located
>> somehow, only then can the decision happen about whether to trust or not
>> and see if another up the chain is needed too.
> 
> 
>>>
>>> And so what?
> 
>> So by walking the chain and filling in as needed the cert validator
>> helper can probably fill the whole sequence in and reach a root CA that
>> is already trusted and tells you the found ones can be too. That is what
>> the Browsers do.
> 
> 
>> Amos
>> _______________________________________________
>> squid-users mailing list
>> squid-users@xxxxxxxxxxxxxxxxxxxxx
>> http://lists.squid-cache.org/listinfo/squid-users
> 
> 
> _______________________________________________
> squid-users mailing list
> squid-users@xxxxxxxxxxxxxxxxxxxxx
> http://lists.squid-cache.org/listinfo/squid-users
> 

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux