Re: [squid-users] ssl_bump peek in squid-3.5.3

2015-04-24 Thread Michael Hendrie

 On 23 Apr 2015, at 9:22 pm, James Lay j...@slave-tothe-box.net wrote:
 
 Michael,
 
 Could you post your entire config here if possible?  Many of us continue to 
 face challenges with ssl_bump and a working config would be great.  Thank you.
 
 James

My ssl_bump configuration is contained in a separate conf file that is 
“included” via the main squid.conf file.  There is nothing special about my 
main squid.conf, here is the contents of the include:

https_port 8090 tproxy ssl-bump generate-host-certificates=on 
dynamic_cert_mem_cache_size=16MB cert=/etc/squid/ssl-bump.cer 
key=/etc/squid/ssl-bump.key cafile=/etc/squid/ssl-bump.cer
acl p8090 myportname 8090
acl step1 at_step SslBump1
ssl_bump peek step1
ssl_bump bump p8090

Which was built using information from 
http://wiki.squid-cache.org/Features/SslPeekAndSplice 
http://wiki.squid-cache.org/Features/SslPeekAndSplice


___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] ssl_bump peek in squid-3.5.3

2015-04-23 Thread Michael Hendrie

 On 23 Apr 2015, at 4:21 pm, Amos Jeffries squ...@treenet.co.nz wrote:
 
 On 23/04/2015 6:29 p.m., Michael Hendrie wrote:
 Hi All
 
 I’ve been running squid-3.4.x in tproxy mode with ssl_bump
 server-first for some time and has been working great.
 
 I have just moved to 3.5.3 to use peek to overcome some issues with
 sites that require SNI to serve up the correct certificate.  In most
 cases this is work well however I seem to have an issue that (so far)
 only effects the Safari web browser with certain sites.  As an
 example, https://twitter.com https://twitter.com/ and
 https://www.openssl.org https://www.openssl.org/ will result in a
 Safari error page “can’t establish a secure connection with the
 server”.  There is also a correlating entry in the cache.log 'Error
 negotiating SSL connection on FD 45: error:140A1175:SSL
 routines:SSL_BYTES_TO_CIPHER_LIST:inappropriate fallback (1/-1)’
 
 Please try the latest snapshot of 3.5 series. There are some TLS session
 resume and SNI bug fixes.

Thanks Amos, but I did try squid-3.5.3-20150420-r13802 before posting….any 
other suggestions?

Michael
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] ssl_bump peek in squid-3.5.3

2015-04-23 Thread Michael Hendrie

 On 23 Apr 2015, at 4:28 pm, Michael Hendrie mich...@hendrie.id.au wrote:
 
 
 On 23 Apr 2015, at 4:21 pm, Amos Jeffries squ...@treenet.co.nz wrote:
 
 On 23/04/2015 6:29 p.m., Michael Hendrie wrote:
 Hi All
 
 I’ve been running squid-3.4.x in tproxy mode with ssl_bump
 server-first for some time and has been working great.
 
 I have just moved to 3.5.3 to use peek to overcome some issues with
 sites that require SNI to serve up the correct certificate.  In most
 cases this is work well however I seem to have an issue that (so far)
 only effects the Safari web browser with certain sites.  As an
 example, https://twitter.com https://twitter.com/ and
 https://www.openssl.org https://www.openssl.org/ will result in a
 Safari error page “can’t establish a secure connection with the
 server”.  There is also a correlating entry in the cache.log 'Error
 negotiating SSL connection on FD 45: error:140A1175:SSL
 routines:SSL_BYTES_TO_CIPHER_LIST:inappropriate fallback (1/-1)’
 
 Please try the latest snapshot of 3.5 series. There are some TLS session
 resume and SNI bug fixes.
 
 Thanks Amos, but I did try squid-3.5.3-20150420-r13802 before posting….any 
 other suggestions?
 
 Michael

OK, I seem to have resolved this now, for the benefit of everyone else on the 
list:

In the above tests the generated certificate was being signed by a RootCA that 
was installed as trusted in the browser certificate store.  

I had previously noticed in my test environment (and thought completely 
unrelated) that bumped requests using the new peek/bump in 3.5.x were not 
sending the entire certificate chain to the browser but since they trusted the 
RootCA that was fine.  In my production environment however I use an 
IntermediateCA to sign the bumped requests, this causes a browser error as the 
clients only trust the RootCA.  As part of investigation to resolve this, I 
found that adding ‘cafile=/path/to/signing_ca_bundle’ to the ‘https_port' line 
(which in my config is exactly the same file as ‘cert=‘) that all certs are 
sent to the client, and I no longer face the issue with Safari and 
https://twitter.com https://twitter.com/ or https://www.openssl.org 
https://www.openssl.org/ regardless of using RootCA or InterCA to sign bumped 
requests.

Not sure why but ‘ssl_bump server-first’ sends the entire chain without 
specifying ‘cafile=‘ and ‘ssl_bump peek/bump’ doesn’t…but anyway my problem is 
solved!

Michael

___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] ssl_bump peek in squid-3.5.3

2015-04-23 Thread James Lay
On Thu, 2015-04-23 at 17:18 +0930, Michael Hendrie wrote:

 
 
  On 23 Apr 2015, at 4:28 pm, Michael Hendrie mich...@hendrie.id.au
  wrote:
  
  
  
  
  
   On 23 Apr 2015, at 4:21 pm, Amos Jeffries squ...@treenet.co.nz
   wrote:
   
   On 23/04/2015 6:29 p.m., Michael Hendrie wrote:
   
Hi All

I’ve been running squid-3.4.x in tproxy mode with ssl_bump
server-first for some time and has been working great.

I have just moved to 3.5.3 to use peek to overcome some issues
with
sites that require SNI to serve up the correct certificate.  In
most
cases this is work well however I seem to have an issue that (so
far)
only effects the Safari web browser with certain sites.  As an
example, https://twitter.com https://twitter.com/ and
https://www.openssl.org https://www.openssl.org/ will result
in a
Safari error page “can’t establish a secure connection with the
server”.  There is also a correlating entry in the cache.log
'Error
negotiating SSL connection on FD 45: error:140A1175:SSL
routines:SSL_BYTES_TO_CIPHER_LIST:inappropriate fallback (1/-1)’
   
   
   Please try the latest snapshot of 3.5 series. There are some TLS
   session
   resume and SNI bug fixes.
  
  
  Thanks Amos, but I did try squid-3.5.3-20150420-r13802 before
  posting….any other suggestions?
  
  Michael
 
 
 
 OK, I seem to have resolved this now, for the benefit of everyone else
 on the list:
 
 
 In the above tests the generated certificate was being signed by a
 RootCA that was installed as trusted in the browser certificate
 store.  
 
 
 I had previously noticed in my test environment (and thought
 completely unrelated) that bumped requests using the new peek/bump in
 3.5.x were not sending the entire certificate chain to the browser but
 since they trusted the RootCA that was fine.  In my production
 environment however I use an IntermediateCA to sign the bumped
 requests, this causes a browser error as the clients only trust the
 RootCA.  As part of investigation to resolve this, I found that adding
 ‘cafile=/path/to/signing_ca_bundle’ to the ‘https_port' line (which in
 my config is exactly the same file as ‘cert=‘) that all certs are sent
 to the client, and I no longer face the issue with Safari and
 https://twitter.com or https://www.openssl.org regardless of using
 RootCA or InterCA to sign bumped requests.
 
 
 Not sure why but ‘ssl_bump server-first’ sends the entire chain
 without specifying ‘cafile=‘ and ‘ssl_bump peek/bump’ doesn’t…but
 anyway my problem is solved!
 
 
 Michael
 
 
 
 ___
 squid-users mailing list
 squid-users@lists.squid-cache.org
 http://lists.squid-cache.org/listinfo/squid-users


Michael,

Could you post your entire config here if possible?  Many of us continue
to face challenges with ssl_bump and a working config would be great.
Thank you.

James
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users