> Hi, all
>
> Now, I evaluate the squid3.1.0.6 + tproxy4 environment like the
> following network.
>
>             (1)                     (2)
>
>              |                       |
>   +------+   |     +------------+    |    +---------+
>   |WWW   +---+     |            |    +----+ WWW     |
>   |Client|.2 |   .1| squid      |.1  |  .2|  Server |
>   +------+   +-----+   + tproxy +----+    |(tcp/443)|
>              |     | (tcp/8080) |    |    |(tcp/80) |
>              |     +------------+    |    +---------+
>        192.168.0.0/24          10.0.0.0/24
>
>   (1) 192.168.0.2 ------>  192.168.0.1:8080
>   (2) 192.168.0.2 ------>  10.0.0.2:80
>
> HTTP communication is completely OK !
> but in HTTPS(using CONNECT method) case
>
>   (1) 192.168.0.2 ------>  192.168.0.1:8080
>   (2) 192.168.0.2 ------>  10.0.0.2:443
>                                     ^^^^
> the following error occurred.
>
>> commBind: Cannot bind socket FD 12 to 192.168.0.2: (99) Cannot
>>           assign requested address
>
> I think that tunnelStart()#tunnel.cc don't support "COMM_TRANSPARENT"
>
>> tunnelStart(ClientHttpRequest * http, int64_t * size_ptr, int*
>> status_ptr)
>> {
>>  ... snip ...
>>    sock = comm_openex(SOCK_STREAM,
>>                       IPPROTO_TCP,
>>                       temp,
>>                       COMM_NONBLOCKING,  // need COMM_TRANSPARENT
>>                       getOutgoingTOS(request),
>>                       url);
>>  ... snip ...
>
> What do you think ?

HTTPS encrypted traffic cannot be intercepted.

Amos


Reply via email to