Search squid archive

Re: squid interception

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 25.09.18 12:39, Yann Girardin wrote:
We have encountered what we think is a strange behavior of Squid when in
interception.  We know that it's not a bug but made on purpose, but we
question ourself on the why of this choice.

We have a firewall that we have configured to redirect all TCP packets
with the destination port set to 80 to the squid box.  This redirection is
made by changing the destination IP to the address of the Squid box and

this is wrong way to do interception and it opens door to a security
vulnerability.

squid needs to know the destination IP, otherwise it does not know where it
has to connect.

The Host: header is NOT a reliable info, because it can contain false
information. see the vulnerability info:

https://nvd.nist.gov/vuln/detail/CVE-2009-0801
https://www.kb.cert.org/vuls/id/435052

destination port to 8080.  On the box, we set up Squid to listen to port
9090 in interception mode.  Moreover, we use some DNAT rules to redirect
the traffic from port 8080 to port 9090.  Yes, we know that we shouldn't
do that, but "we" includes some third parties.

the proper way to do interception is to forward packets do squid host
without changing the destination I

https://wiki.squid-cache.org/SquidFaq/InterceptionProxy

--
Matus UHLAR - fantomas, uhlar@xxxxxxxxxxx ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Saving Private Ryan...
Private Ryan exists. Overwrite? (Y/N)
_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
http://lists.squid-cache.org/listinfo/squid-users




[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux