Thank you for the directions, I have the https proxy working now. I got a signed CA cert and installed it on the squid server and after importing the intermediate cert into the client, it is working as expected.
*https_port 3128 tls-cert=/etc/squid/ssl_cert/ssl_certificate.cer tls-key=/etc/squid/ssl_cert/proxy.key* Thanks for all the help and the responsiveness. Subhish On Fri, Dec 14, 2018 at 2:33 PM Alex Rousskov < rouss...@measurement-factory.com> wrote: > On 12/14/18 12:03 PM, Subhish Pillai wrote: > > > my use case for the squid proxy is to be able to accept a > > HTTPS_proxy request from the client and tunnel it forward to the > > destination server. > > > How do I get this to work without having to create self-signed certs on > > the proxy server and importing that into the client ca-bundle. > > Get a server certificate from a CA authority that the client trusts, > issued for the Squid proxy domain. Give Squid that certificate. For > example, you may be able to use a free letsencrypt.org CA. > > An HTTPS proxy needs a certificate it can sign its traffic with. That > certificate must be issued by a client-trusted CA. Whether that is a > fake CA that you operate (what you may have referred to as a > "self-signed cert" above) or a real CA trusted by millions of other > clients (e.g., letsencrypt), is your choice. > > > > For that I copied over the CA bundle from the client > > into the proxy server and pointed the "tls-cert" option to that file > > Why? Please suggest specific documentation changes that would remove the > implication that doing the above has something to do with your goals. > That option is for specifying the signing certificate (i.e. the > certificate the proxy is going to sign traffic with). > > > > Am I missing any config steps in the squid.conf file? > > You are missing a clientca or tls-cafile option that triggers client > certificate request (from Squid to client) and gives Squid CA > certificates to trust when validating the client-supplied certificate. > This is unrelated to the Squid signing certificate discussed above. > > Alex. > > > > On Wed, Dec 12, 2018 at 6:53 PM Amos Jeffries <squ...@treenet.co.nz > > <mailto:squ...@treenet.co.nz>> wrote: > > > > On 13/12/18 12:50 pm, Subhish Pillai wrote: > > > Thanks Alex, that was very helpful. > > > > > > Based on your explanation, I just want to use squid as a blind TCP > > > tunnel carrying the HTTPS connection from client to app server. > > > > > > In that case, I don't need to use ssl_bump feature and the ssl_crtd > > > program for certificate management, is that correct? > > > > > > > Going by the description you gave of the client configuration, it > > should be. > > > > > > > Would this config file work to setup the TCP tunnel -- > > > > ... > > > ## Allow server side certificate errors such as untrusted > > certificates, > > > otherwise the connection is closed for such errors > > > sslproxy_cert_error allow all > > > > > > ## Accept certificates that fail verification (should only be > > needed if > > > using 'sslproxy_cert_error allow all') > > > sslproxy_flags DONT_VERIFY_PEER > > > > > > > These sslproxy_* options only apply when Squid is actively performing > > TLS to upstream servers. They have no place in the "blind tunnel" > > situation. > > (They also are deprecated in Squid-4, replaced by the > > tls_outgoing_options directive > > <http://www.squid-cache.org/Doc/config/tls_outgoing_options/>). > > > > If the client software is sending CONNECT requests containing the > HTTPS > > traffic, then there is absolutely nothing your config needs to do > than > > let them send those requests to the proxy (as the default config > does). > > > > You do not even need Squid to be built with TLS/SSL support. That is > the > > meaning of "blind" in this setup. > > > > Amos > > _______________________________________________ > > squid-users mailing list > > squid-users@lists.squid-cache.org > > <mailto:squid-users@lists.squid-cache.org> > > http://lists.squid-cache.org/listinfo/squid-users > > > > > > > > -- > > > > *Subhish Pillai* > > > > R&D Software Quality Engineer > > > > Broadcom | Brocade Storage Networking > > > > T (720) 462-2900 > > > > > > _______________________________________________ > > squid-users mailing list > > squid-users@lists.squid-cache.org > > http://lists.squid-cache.org/listinfo/squid-users > > > > _______________________________________________ > squid-users mailing list > squid-users@lists.squid-cache.org > http://lists.squid-cache.org/listinfo/squid-users > -- *Subhish Pillai* R&D Software Quality Engineer Broadcom | Brocade Storage Networking T (720) 462-2900
_______________________________________________ squid-users mailing list squid-users@lists.squid-cache.org http://lists.squid-cache.org/listinfo/squid-users