Search squid archive

Re: Questions about Squid configuration

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dear Alex.

Thank you for your advice!

>Do you run these "curl" commands on the same box that runs Squid?
No, we have a Squid validation environment on an AWS EC2 instance,
and the instance for Squid and the instance for running curl commands
are separate.

>However, you may want to double check whether rejecting requests with an
>empty Host header is actually necessary in your environment. Perhaps
>they can be considered valid (which is what Squid does by default)?
Thank you.
Indeed we do not want to explicitly reject empty Host headers, we just
want to reject malformed requests.
Therefore, we will not add an explicit rejection setting.

>I recommend deleting the above http_access rule. AFAICT, you only want
>to allow valid requests targeting specific/allowed sites. You already
>have other rules for that. The above "all HTTPS" rule is too broad and
>is seemingly unnecessary.

>I also recommend deleting a similar rule that allows all port-80
>requests, for similar reasons:
>     acl http_port port 80
>     http_access allow http_port


>If you think you do need those two broad rules, please clarify what you
>think you need them for. In other words, what tests would break if you
>remove them?
I did not need these rules, so I removed them and verified STEP 2
again and everything passed!
Thank you so much for your help!!

We then added the following settings that were in the existing Squid proxy
*The entire configuration is attached to this email.

# SSL_BUMP
acl allowed_https_sites ssl::server_name "/etc/squid/whitelist"
acl allowed_https_sites ssl::server_name "/etc/squid/whitelist_transparent"
acl allowed_https_sites ssl::server_name "/etc/squid/whitelist_https"
acl allowed_https_sites ssl::server_name
"/etc/squid/whitelist_transparent_https"
sslcrtd_program [sslcrtd-program-setting]

acl step1 at_step SslBump1
acl step2 at_step SslBump2
acl step3 at_step SslBump3

ssl_bump peek step1 all
ssl_bump peek step2 allowed_https_sites
ssl_bump splice step3 allowed_https_sites
ssl_bump terminate step2 all

Then I verified the 4 patterns again and all of them gave me 403 Forbidden...
Even the following pattern which is allowed in whitelist.
> 1. successful communication of a valid request to an allowed site
> [command]
> curl https://pypi.org/ -v --cacert squid.crt -k

After checking access-transparent.log and cache.log, it appears that
pypi.org is comparing inspections by IP and not by domain.
How do I modify the configuration to allow this correctly by domain?
Also, to begin with, these settings follow the existing squid proxy
created by my predecessor, so I don't know what they are for...
What are the disadvantages of removing these settings?

Thank you in advance.

Attachment: squid-transparent.conf
Description: Binary data

_______________________________________________
squid-users mailing list
squid-users@xxxxxxxxxxxxxxxxxxxxx
https://lists.squid-cache.org/listinfo/squid-users

[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux