Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Rafael Akchurin
Hello Daniel, Yuri May be you could dump your whole squid.conf here (please remove any sensitive details). I still cannot understand once Squid has the target server hostname from SNI - where is the acl/rule in squid.conf that can be used with this info present? Best regards, Rafael _

Re: [squid-users] need 206 to be 200

2015-01-26 Thread HackXBack
I always see in access.log for the partial content TCP_HIT_ABORTED/206 and this content eat my whole bandwidth my conf is range_offset_limit none partial quick_abort_min 1840 KB quick_abort_max 1844 KB -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/need-2

Re: [squid-users] need 206 to be 200

2015-01-26 Thread Amos Jeffries
On 27/01/2015 1:38 a.m., HackXBack wrote: > I always see in access.log for the partial content > TCP_HIT_ABORTED/206 ABORTED means the client disconnected. There is nothing you can do about that in Squid. HIT means the object delivered came from cache. No upstream bandwidth was consumed in the p

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Daniel Greenwald
See below. Nothing else too interesting. Those four lines were the key. http_port 3128 http_port 3180 intercept https_port 3443 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=16MB cert=/usr/local/squid/ssl_cert/myCA.pem sslcrtd_program /usr/lib64/squid/ssl_crtd -s /u

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Raf, wil be better to take a look on Squid source. My config similar Daniel's, excluding bump options - I have 3.4.11 in production yet. 26.01.2015 19:37, Daniel Greenwald пишет: > See below. Nothing else too interesting. Those four lines were the

Re: [squid-users] FATAL: The ssl_crtd helpers are crashing too rapidly, need help!

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://bugs.squid-cache.org/index.cgi 26.01.2015 5:09, HackXBack пишет: > Dear Yuri, > how I open bug ? > > > > -- > View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/FATAL-The-ssl-crtd-helpers-are-crashing-too-rapidly

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daniel, well, but AFAIK server-first directive is deprecated in 3.5.x. Hmm? 26.01.2015 19:37, Daniel Greenwald пишет: > See below. Nothing else too interesting. Those four lines were the key. > > http_port 3128 > http_port 3180 intercept > ht

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Daniel Greenwald
call it what you want, it works :) --- Daniel I Greenwald On Mon, Jan 26, 2015 at 10:51 AM, Yuri Voinov wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Daniel, > > well, > > but AFAIK server-first directive is deprecated in 3.5.x. > > Hmm? > > 26.01.2015 19:37, Dani

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm not about it. server-first keyword deprecated in 3.5.x. AFAIK, keywork "bump" now has yet another meaningful. And also: in your example can only use acl "all". Any other ACL's leading "Bungled config line" error. I.e, for example, acl net_bu

[squid-users] Error negotiating SSL connection on FD 20: error:00000000:lib(0):func(0):reason(0) (5/-1/131)

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi gents, who know, what this log messages mean: 2015/01/26 22:02:34 kid1| fwdNegotiateSSL: Error negotiating SSL connection on FD 20: error::lib(0):func(0):reason(0) (5/-1/131) 2015/01/26 22:02:41 kid1| fwdNegotiateSSL: Error negotiating S

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Amos Jeffries
On 27/01/2015 5:37 a.m., Yuri Voinov wrote: > > I'm not about it. > > server-first keyword deprecated in 3.5.x. > > AFAIK, keywork "bump" now has yet another meaningful. > > And also: in your example can only use acl "all". Any other ACL's > leading "Bungled config line" error. > > I.e, for ex

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 It's mistype. :) Of course, I mean acl net_bump src 192.168.101.0/24 Yep, sure - when I change "all" to another ACL - row bungled. 26.01.2015 23:33, Amos Jeffries пишет: > On 27/01/2015 5:37 a.m., Yuri Voinov wrote: >> >> I'm not about it. >> >

[squid-users] HTTPS intercept, simple configuration to avoid bank bumping

2015-01-26 Thread Josep Borrell
Hi all, Working on squid 3.5.1 with HTTPS interception. Trying to make a peek/splice configuration to work and avoid bank bumping. Until now bumping is working fine but can't avoid to bump sites on acl. All are bumped. Can anybody share a working configuration or take a look at mine to find why i

Re: [squid-users] Error negotiating SSL connection on FD 20: error:00000000:lib(0):func(0):reason(0) (5/-1/131)

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 After a bit Google-Fu ;) I found this: http://stackoverflow.com/questions/14770100/libssl-read-error-131-causing-an-application-crash Is that it? 26.01.2015 23:22, Yuri Voinov пишет: > > Hi gents, > > who know, what this log messages mean: > > 20

Re: [squid-users] HTTPS intercept, simple configuration to avoid bank bumping

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You can't use dstdomain ACL for disable bumping. Only dst with IP's. You don't know site FQDN before bump. :) 26.01.2015 23:48, Josep Borrell пишет: > > Hi all, > > > > Working on squid 3.5.1 with HTTPS interception. > > Trying to make a peek/spl

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Daniel Greenwald
Thank you Amos, I have updated to bump. Working well just the same.. Even chrome doesn't complain for google properties. Very nice. --- Daniel I Greenwald On Mon, Jan 26, 2015 at 12:35 PM, Yuri Voinov wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > It's mistype. :) > >

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Still not working. Every HTTPS-site produces error like that: 1422297291.318 0 192.168.100.5 TAG_NONE_ABORTED/000 0 GET https://r5---sn-h xb54vo-304l.googlevideo.com/videoplayback?gir=yes&mm=31&signature=CF822B36D7CA4B 43B8D1244FFF568777CDFB7B

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 With this: acl step2 at_step SslBump2 acl step3 at_step SslBump3 ssl_bump peek step2 all ssl_bump bump step3 all it does'nt produce errors, but also doesn't bump. No mimicked certificates created. No one. Yep, permissions are ok. Yep, owner is ok

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Daniel, you really sure you configuration makes bumping? /var/lib/ssl_db/certs/ remains empty, Squid cannot bump without mimicked certs, which is not produces. I've seen only tunneling CONNECT with your configuration (of course, you browser glad

Re: [squid-users] Why 3.5.0.4 generates mimicked certs with server IP only when bumping?

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 No one ssl_bump combination did not work. With your config I see only: 1422299531.482 18722 192.168.100.5 TCP_TUNNEL/200 99418 CONNECT 128.121.22.133: 443 - ORIGINAL_DST/128.121.22.133 - and connection does'nt established. No errors - no bump. C

Re: [squid-users] HTTPS intercept, simple configuration to avoid bank bumping

2015-01-26 Thread Daniel Greenwald
hmm acc to how I read this page: http://wiki.squid-cache.org/Features/SslPeekAndSplice The following *should* work, however in my test it bumps all and does not splice. Yuri- I believe, the domain name should be available at step2 after peeking in step1. Someone correct me? acl domains_nobump dst

Re: [squid-users] HTTPS intercept, simple configuration to avoid bank bumping

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In theory. I don't see any 3.5.x bump working yet. In 3.4.x bumping not chunked to stages and only IP-based dst acls will working. 27.01.2015 1:54, Daniel Greenwald пишет: > hmm acc to how I read this page: > http://wiki.squid-cache.org/Features/

Re: [squid-users] Error negotiating SSL connection on FD 20: error:00000000:lib(0):func(0):reason(0) (5/-1/131)

2015-01-26 Thread HackXBack
when you know tell me because i asked this question before here and i didnt get any answer -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/Error-negotiating-SSL-connection-on-FD-20-error--lib-0-func-0-reason-0-5-1-131-tp4669338p4669351.html Sent from

Re: [squid-users] Error negotiating SSL connection on FD 20: error:00000000:lib(0):func(0):reason(0) (5/-1/131)

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I suggest we are asking in wrong place :) This is OpenSSL error stack, not squid. Also, man, which root CA bundle you are use in your installation? 27.01.2015 2:49, HackXBack пишет: > when you know tell me because i asked this question before here

Re: [squid-users] HTTPS intercept, simple configuration to avoid bank bumping

2015-01-26 Thread Jason Haar
Well the documentation says # SslBump1: After getting TCP-level and HTTP CONNECT info. # SslBump2: After getting SSL Client Hello info. # SslBump3: After getting SSL Server Hello info. So that means SslBump1 only works for direct proxy (ie CONNECT) sessions, it's SslBump2 that peeks into

[squid-users] Host header forgery detected

2015-01-26 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi gents, who knows - what does it mean below? 2015/01/27 04:11:42.289 kid1| SECURITY ALERT: Host header forgery detected on local=192.168.200.3:80 remote=192.168.200.5:9909 FD 18 flags=33 (intercepted port does not match 443) 2015/01/27 04:11:42.2

Re: [squid-users] HTTPS intercept, simple configuration to avoid bank bumping

2015-01-26 Thread Dan Charlesworth
Wasn't somebody saying that you'd need write an External ACL to evaluate the SNI host because dstdomain isn't hooked into that code (yet? ever?)? On 27 January 2015 at 08:33, Jason Haar wrote: > > Well the documentation says > > # SslBump1: After getting TCP-level and HTTP CONNECT info. > #

Re: [squid-users] Host header forgery detected

2015-01-26 Thread Amos Jeffries
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 27/01/2015 11:13 a.m., Yuri Voinov wrote: > > -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > > Hi gents, > > who knows - what does it mean below? > > 2015/01/27 04:11:42.289 kid1| SECURITY ALERT: Host header forgery > detected on local=192.168