Re: [squid-users] Issues with ssl-bump in 3.HEAD

2014-06-13 Thread Amos Jeffries

 On 6/12/2014 6:04 PM, Eliezer Croitoru wrote:
 On 06/13/2014 01:04 AM, Mike wrote:
 So I re-add it for testing:

 http_port 3128

NP: forward-proxy traffic no bumping

 http_port 3129 intercept ssl-bump... blah blah

... and port 80 intercepted traffic and bumping CONNECT requests...

  ... CONNECT is not a valid method in port 80 traffic.

Thus Eliezer says:

 You cannot use this and the cache.log will tell you that...
 Try to setup the server like this:
 http_port 3128

NP: forward-proxy traffic no bumping

 http_port 13129 intercept

... and port 80 intercepted traffic

 https_port 13130 intercept ssl-bump ...

... and port 443 intercepted traffic having its TLS bumped.


 With just basic settings.
 And still it looks like a look so what are the iptables rules you are
 using?


On 13/06/2014 2:36 p.m., Mike wrote:
 So then next question is how do I know for sure ssl-bump is working?

You will see https:// URLs logged in access.log as the bumped traffic
gets served. When its fails you will get only CONNECT requests in
access.log, maybe also TLS/SSL errors in cache.log.


 So
 far all the certificates match the servers, and I am able to use acls
 like 'acl blacklist1 dstdom_regex -i /etc/blacklists/dom_bl' to block
 domains, even if it is a secure site... but overall I have not figured
 out how to tell if ssl-bump is actually working or not.


dstdom* ACLs results can vary depending on whether rDNS is known to
Squid. If you want to use ACLs to test working ssl-bump you need to use
some detail such as path which is fully encrypted and requires the bump
to have succeeded to even test. Easier is to eyeball the access.log
contents though.

Amos


Re: [squid-users] How can I make squid ignore cached DNS looks up ?

2014-06-13 Thread Amos Jeffries
On 13/06/2014 12:29 p.m., Mark jensen wrote:
 About the Note:
 
 Note that it is BAD practice to change a zone file entry more often than
 *daily*. Reseting PTR records every 1 minute or less will screw up in a
 great many systems, Squid is just one.
 
 
 Is it so bad if the system is a small system ( consist of 500 users)

YMMV on how bad. Every request which is slowed down while re-fetching
DNS results (necessary or not) is added annoyance for the clients
waiting on those results and indirectly for all the other clients who
may be needing to use the proxy CPU and RAM resources for other traffic.

Amos



[squid-users] redirector/rewriter help

2014-06-13 Thread Jiann-Ming Su
I'm using squid 3.1.20 on Debian.  Trying to figure out what I need to do to 
cache redirected content.  For example, I'm trying to download a file with a 
generic URL.  The download site redirects (302) the generic URL to one of its 
various mirrors.  Problem is each time I hit that URL with a different client, 
it's a different download because the mirror site changes.  


How do I configure squid to cache the downloaded file based on the generic URL 
rather than on the redirected URL?  Thanks for any pointers to any relevant 
resources.



[squid-users] Re: redirector/rewriter help

2014-06-13 Thread babajaga
StoreID should help you; may be together with a special helper. There are a
few examples in the wiki.



--
View this message in context: 
http://squid-web-proxy-cache.1019090.n4.nabble.com/redirector-rewriter-help-tp4666339p4666340.html
Sent from the Squid - Users mailing list archive at Nabble.com.


Re: [squid-users] Issues with ssl-bump in 3.HEAD

2014-06-13 Thread Alex Rousskov
On 06/12/2014 08:36 PM, Mike wrote:

 So then next question is how do I know for sure ssl-bump is working?

A simple test is to look at the root CA certificate shown by the browser
at the *top* of the certificate chain for a secure (https) site. Please
note that you should not be looking at the site certificate. You should
be looking at the certificate that was used to sign the site certificate
(or the certificate that was used to sign the certificate that was used
to sign the site certificate, etc. -- go to the root of the certificate
chain).

If that root certificate is yours, then the site was bumped. If it is an
official root CA from a well-known company, the site was not bumped.

To check SslBump for many sites, you have to examine Squid logs which is
more difficult, especially if you test this with a mix of secure and
insecure traffic.


HTH,

Alex.



Re: [squid-users] Issues with ssl-bump in 3.HEAD

2014-06-13 Thread Mike

On 6/13/2014 10:02 AM, Alex Rousskov wrote:

On 06/12/2014 08:36 PM, Mike wrote:


So then next question is how do I know for sure ssl-bump is working?

A simple test is to look at the root CA certificate shown by the browser
at the *top* of the certificate chain for a secure (https) site. Please
note that you should not be looking at the site certificate. You should
be looking at the certificate that was used to sign the site certificate
(or the certificate that was used to sign the certificate that was used
to sign the site certificate, etc. -- go to the root of the certificate
chain).

If that root certificate is yours, then the site was bumped. If it is an
official root CA from a well-known company, the site was not bumped.

To check SslBump for many sites, you have to examine Squid logs which is
more difficult, especially if you test this with a mix of secure and
insecure traffic.


HTH,

Alex.

If thats the case then ssl-bump is not working. The root certificates 
all show the mainstream companies, Digicert, Godaddy, Verisign, etc.



Mike


[squid-users] Re: squid with qlproxy on fedora 20 not working for https traffic

2014-06-13 Thread MrErr
So if i want to ssl_bump only google, will the following statements work?

acl https_targets dstdomain .google.com
ssl_bump server-first https_targets

I already tried it, and they don't seem to work. What would be a working
configuration if i wanted only google.com to be bumped?

ssl_bump server-first all, works but it bogs down squid and this slows down
the internet.



--
View this message in context: 
http://squid-web-proxy-cache.1019090.n4.nabble.com/squid-with-qlproxy-on-fedora-20-not-working-for-https-traffic-tp4666277p4666343.html
Sent from the Squid - Users mailing list archive at Nabble.com.


[squid-users] Fwd: gmail.com certificate name mismatch

2014-06-13 Thread Douglas Davenport
I have squid 3.3.10 setup with sslbump working for all sites except
when a user tries to type in gmail.com. For some reason the browser
complains about certificate name mismatch. On examination the
generated cert is actually for mail.google.com. Apparently google is
redirecting buy why does this error happen only with sslbump. Anyone
else have this issue, workarounds?

Thanks in advance!


[squid-users] Squid+openbsd 5.5 on sparc 64

2014-06-13 Thread Monah Baki
OpenBSD 5.5-stable (GENERIC.MP) #1: Thu Jun 12 18:57:48 EDT 2014
mb...@proxy.home:/usr/src/sys/arch/sparc64/compile/GENERIC.MP
real mem = 17045651456 (16256MB)
avail mem = 16759693312 (15983MB)
mainbus0 at root: SPARC Enterprise T5220




./configure --prefix=/usr/local/squid --with-filedescriptors=32768
--enable-snmp --with-large-files

No errors

Run make after 40 min,


po -c -o client_side.o client_side.cc  mv -f $depbase.Tpo $depbase.Po
depbase=`echo client_side_reply.o | sed 's|[^/]*$|.deps/|;s|\.o$||'`;
g++ -DHAVE_CONFIG_H
-DDEFAULT_CONFIG_FILE=\/usr/local/squid/etc/squid.conf\
-DDEFAULT_SQUID_DATA_DIR=\/usr/local/squid/share\
-DDEFAULT_SQUID_CONFIG_DIR=\/usr/local/squid/etc\  -I.. -I../include
-I../lib  -I../src -I../include   -I/usr/include/kerberosV
-I/usr/include/kerberosV  -I../libltdl  -I../src -I../libltdl
-I/usr/include/kerberosV  -I/usr/include/kerberosV
-I/usr/include/kerberosV  -I/usr/include/kerberosV  -Wall
-Wpointer-arith -Wwrite-strings -Wcomments -Wshadow -Werror -pipe
-D_REENTRANT -g -O2 -MT client_side_reply.o -MD -MP -MF $depbase.Tpo
-c -o client_side_reply.o client_side_reply.cc  mv -f $depbase.Tpo
$depbase.Po
cc1plus: warnings being treated as errors
client_side_reply.cc: In member function 'void
clientReplyContext::buildReplyHeader()':
client_side_reply.cc:1326: warning: format '%ld' expects type 'long
int', but argument 4 has type 'long long int'
*** Error 1 in src (Makefile:6970 'client_side_reply.o')
*** Error 1 in src (Makefile:7116 'all-recursive')
*** Error 1 in src (Makefile:6036 'all')
*** Error 1 in /home/mbaki/squid-3.4.5 (Makefile:587 'all-recursive')



Thanks


Re: [squid-users] Re: squid with qlproxy on fedora 20 not working for https traffic

2014-06-13 Thread Amos Jeffries
On 14/06/2014 4:44 a.m., MrErr wrote:
 So if i want to ssl_bump only google, will the following statements work?
 
 acl https_targets dstdomain .google.com
 ssl_bump server-first https_targets
 
 I already tried it, and they don't seem to work. What would be a working
 configuration if i wanted only google.com to be bumped?

Identify all the IP addresses used by Google and create a dst ACL from them.

 
 ssl_bump server-first all, works but it bogs down squid and this slows down
 the internet.

The price of TLS is increased resource usage and slower traffic. The use
of a proxy to decrypt and re-encrypt along the way doubles the
requirements and halves the speed.

Amos



[squid-users] Re: squid with qlproxy on fedora 20 not working for https traffic

2014-06-13 Thread MrErr
Does this mean that dstdomain does not work with ssl-bump?

My other reason for not using ssl-bump server-first all is that the kindle
fire stops working. I read that it was because of something called ssl
pinning. So i do need to get some kind of targeted bumping to happen.  



--
View this message in context: 
http://squid-web-proxy-cache.1019090.n4.nabble.com/squid-with-qlproxy-on-fedora-20-not-working-for-https-traffic-tp4666277p4666347.html
Sent from the Squid - Users mailing list archive at Nabble.com.


Re: [squid-users] Re: squid with qlproxy on fedora 20 not working for https traffic

2014-06-13 Thread Amos Jeffries
On 14/06/2014 1:23 p.m., MrErr wrote:
 Does this mean that dstdomain does not work with ssl-bump?

Yes and no. It works with CONNECT bumping in regular proxy traffic. It
does not work on intercepted port 443 traffic reliably.

 
 My other reason for not using ssl-bump server-first all is that the kindle
 fire stops working. I read that it was because of something called ssl
 pinning. So i do need to get some kind of targeted bumping to happen. 
 

HSTS probably. And yes those sites bumping does not work for.

Amos