> On Apr 17, 2016, at 5:50 AM, Yuri Voinov <yvoi...@gmail.com> wrote: > > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > *NIX means UNIX. Solaris is AT&T UNIX. Linux is not UNIX (C) Linus Torvalds. > :) We are not speaking about all possible OS'es. I suggests the matter in > SSL/TLS, not OS or hands or something similar. > > The problem is in CF, I think. As a maximum in peek-n-splice. > > > Because of I've not changed my squid.conf over last year, but approx. in > january 2016 CloudFlare stopped work via proxy, as said my field SA. AFAIK, > CF change own security settings. Also, I suggests, mozilla .org also moved > behind CF. > > Ok, let's talk about squid.conf. SSL-related rows are here: > > # SSL bump rules > acl DiscoverSNIHost at_step SslBump1 > acl NoSSLIntercept ssl::server_name_regex -i "/usr/local/squid/etc/url.nobump" > acl NoSSLIntercept ssl::server_name_regex -i "/usr/local/squid/etc/url.tor" > ssl_bump peek DiscoverSNIHost > ssl_bump splice NoSSLIntercept > ssl_bump bump all > > http_port 3126 intercept > https_port 3127 intercept ssl-bump generate-host-certificates=on > dynamic_cert_mem_cache_size=4MB cert=/usr/local/squid/etc/rootCA.crt > key=/usr/local/squid/etc/rootCA.key options=SINGLE_DH_USE,SINGLE_ECDH_USE > tls-dh=prime256v1:/usr/local/squid/etc/dhparam.pem > cipher=HIGH:MEDIUM:!aNULL:!eNULL:!RC4:!LOW:!MD5:!EXP:!PSK:!SRP:!DSS > http_port 3128 ssl-bump generate-host-certificates=on > dynamic_cert_mem_cache_size=4MB cert=/usr/local/squid/etc/rootCA.crt > key=/usr/local/squid/etc/rootCA.key options=SINGLE_DH_USE,SINGLE_ECDH_USE > tls-dh=prime256v1:/usr/local/squid/etc/dhparam.pem > cipher=HIGH:MEDIUM:!aNULL:!eNULL:!RC4:!LOW:!MD5:!EXP:!PSK:!SRP:!DSS > tls_outgoing_options cafile=/usr/local/squid/etc/ca-bundle.crt > options=SINGLE_DH_USE,SINGLE_ECDH_USE > cipher=HIGH:MEDIUM:!aNULL:!eNULL:!RC4:!LOW:!MD5:!EXP:!PSK:!SRP:!DSS > sslproxy_foreign_intermediate_certs /usr/local/squid/etc/intermediate_ca.pem > sslcrtd_program /usr/local/squid/libexec/security_file_certgen -s > /var/lib/ssl_db -M 4MB > > I see no anomalies in this lines. Ciphersuite is very relaxed. > > Also, if we discuss a bug - may be better to turn on debug to know, why 4.x > got first NONE_ABORTED/200 during CONNECT phase and then NONE/503 during TLS > negotiate?
Hi, Yuri, If I understand correctly, the issue is between squid and the origin proxy. In case it would help, have you enabled ECDH sslproxy_options or sslproxy_cipher settings in this snippet that would enable Squid to use ECDH when talking to the origin servers? Do you happen to have a packet capture between your squid server and a CloudFlare server that could help diagnose the TLS protocol’s problem? Regards, Guy _______________________________________________ squid-users mailing list squid-users@lists.squid-cache.org http://lists.squid-cache.org/listinfo/squid-users