tls_outgoing_options options=NO_SSLv3,NO_TLSv1_3
NO_TLSv1_3 is the directive if you need to disable this I have found for all 
other users with this problem 

> On Jul 5, 2024, at 14:21, Jonathan Lee <jonathanlee...@gmail.com> wrote:
> 
> output of versions 
> 
> Shell Output - openssl ciphers -s -v ECDHE
> TLS_AES_256_GCM_SHA384         TLSv1.3 Kx=any      Au=any   Enc=AESGCM(256)   
>          Mac=AEAD
> TLS_CHACHA20_POLY1305_SHA256   TLSv1.3 Kx=any      Au=any   
> Enc=CHACHA20/POLY1305(256) Mac=AEAD
> TLS_AES_128_GCM_SHA256         TLSv1.3 Kx=any      Au=any   Enc=AESGCM(128)   
>          Mac=AEAD
> ECDHE-ECDSA-AES256-GCM-SHA384  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(256)   
>          Mac=AEAD
> ECDHE-RSA-AES256-GCM-SHA384    TLSv1.2 Kx=ECDH     Au=RSA   Enc=AESGCM(256)   
>          Mac=AEAD
> ECDHE-ECDSA-CHACHA20-POLY1305  TLSv1.2 Kx=ECDH     Au=ECDSA 
> Enc=CHACHA20/POLY1305(256) Mac=AEAD
> ECDHE-RSA-CHACHA20-POLY1305    TLSv1.2 Kx=ECDH     Au=RSA   
> Enc=CHACHA20/POLY1305(256) Mac=AEAD
> ECDHE-ECDSA-AES256-CCM8        TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM8(256)  
>          Mac=AEAD
> ECDHE-ECDSA-AES256-CCM         TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM(256)   
>          Mac=AEAD
> ECDHE-ECDSA-AES128-GCM-SHA256  TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESGCM(128)   
>          Mac=AEAD
> ECDHE-RSA-AES128-GCM-SHA256    TLSv1.2 Kx=ECDH     Au=RSA   Enc=AESGCM(128)   
>          Mac=AEAD
> ECDHE-ECDSA-AES128-CCM8        TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM8(128)  
>          Mac=AEAD
> ECDHE-ECDSA-AES128-CCM         TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AESCCM(128)   
>          Mac=AEAD
> ECDHE-ECDSA-AES256-SHA384      TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(256)      
>          Mac=SHA384
> ECDHE-RSA-AES256-SHA384        TLSv1.2 Kx=ECDH     Au=RSA   Enc=AES(256)      
>          Mac=SHA384
> ECDHE-ECDSA-CAMELLIA256-SHA384 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=Camellia(256) 
>          Mac=SHA384
> ECDHE-RSA-CAMELLIA256-SHA384   TLSv1.2 Kx=ECDH     Au=RSA   Enc=Camellia(256) 
>          Mac=SHA384
> ECDHE-ECDSA-AES128-SHA256      TLSv1.2 Kx=ECDH     Au=ECDSA Enc=AES(128)      
>          Mac=SHA256
> ECDHE-RSA-AES128-SHA256        TLSv1.2 Kx=ECDH     Au=RSA   Enc=AES(128)      
>          Mac=SHA256
> ECDHE-ECDSA-CAMELLIA128-SHA256 TLSv1.2 Kx=ECDH     Au=ECDSA Enc=Camellia(128) 
>          Mac=SHA256
> ECDHE-RSA-CAMELLIA128-SHA256   TLSv1.2 Kx=ECDH     Au=RSA   Enc=Camellia(128) 
>          Mac=SHA256
> ECDHE-ECDSA-AES256-SHA         TLSv1   Kx=ECDH     Au=ECDSA Enc=AES(256)      
>          Mac=SHA1
> ECDHE-RSA-AES256-SHA           TLSv1   Kx=ECDH     Au=RSA   Enc=AES(256)      
>          Mac=SHA1
> ECDHE-ECDSA-AES128-SHA         TLSv1   Kx=ECDH     Au=ECDSA Enc=AES(128)      
>          Mac=SHA1
> ECDHE-RSA-AES128-SHA           TLSv1   Kx=ECDH     Au=RSA   Enc=AES(128)      
>          Mac=SHA1
> So it does support TLSv1.3 Could it be because my certificate authority is 
> type RSA? Disabling TLSv1.3 would fix it again that doesn’t help me in the 
> future 
> 
> openssl req -x509 -new -nodes -key myProxykey.key -sha256 -days 365 -out 
> myProxyca.pem
> 
> 
> 
>> On Jul 5, 2024, at 13:54, Jonathan Lee <jonathanlee...@gmail.com> wrote:
>> 
>> I have also tested in 5.8 and 6.6 both show the same condition, 6.6 shows 
>> errors for it however. I have also imported my certificates into wireshark. 
>> 
>> Just to confirm this is the firewall 192.168.1.1 port 3128 is squid going to 
>> iMac that is attempting TSL1.3 I have nosslv3 set also. The firewall is 
>> where I grabbed the pcap from 
>> Sent from my iPhone
>> 
>>> On Jul 5, 2024, at 11:52, Jonathan Lee <jonathanlee...@gmail.com> wrote:
>>> 
>>> If it’s encrypted at TLS1.3 it should still work with the approved 
>>> certificate authority as it is imported to my devices I own. I just enable 
>>> TLS1.3 right?
>>> 
>>>> On Jul 5, 2024, at 11:28, <jonathanlee...@gmail.com> 
>>>> <jonathanlee...@gmail.com> wrote:
>>>> 
>>>> The only one I got a certificate from was the non iMac
>>>> 
>>>> The iMac keeps sending change cipher requests and wants TLS1.3 over and 
>>>> over as soon as a TLS1.2 pops up it works
>>>> 
>>>> That one has the certificate however that system the Toshiba does not have 
>>>> any issues with this error. I highly suspect that I need to enable TLS1.3 
>>>> would you agree?
>>>> 
>>>> -----Original Message-----
>>>> From: Alex Rousskov <rouss...@measurement-factory.com>
>>>> Sent: Friday, July 5, 2024 11:02 AM
>>>> To: squid-users <squid-users@lists.squid-cache.org>
>>>> Cc: Jonathan Lee <jonathanlee...@gmail.com>
>>>> Subject: Re: [squid-users] Squid Cache Issues migration from 5.8 to 6.6
>>>> 
>>>> On 2024-07-05 12:02, Jonathan Lee wrote:
>>>> 
>>>>>> Alex: I recommend determining what that CA is in these cases (e.g., by 
>>>>>> capturing raw TLS packets and matching them with connection information 
>>>>>> from A000417 error messages in cache.log or %err_detail in access.log).
>>>> 
>>>> 
>>>>> I have Wireshark running do I just look for information with
>>>>> ssl.handshake.type == 1
>>>> 
>>>>> Or is there a wireshark particular filter you would like ran to help with 
>>>>> isolation?
>>>> 
>>>> 
>>>> Please use Wireshark to determine the name of CA that issued the 
>>>> certificate that Squid sent to the client in the failing test case. If you 
>>>> are not sure, feel free to share issuer and subject fields of all 
>>>> certificates that Squid sent to the client in that test case (there may be 
>>>> two of each if Squid sent two certificates). Or even share a pointer to 
>>>> the entire (compressed) raw test case packet capture in pcap format!
>>>> 
>>>> These certificates are a part of standard TLS handshake, and Wireshark 
>>>> usually displays their fields when one studies TLS handshake bytes using 
>>>> Wireshark UI.
>>>> 
>>>> I do not know what filter would work best, but there should be just a 
>>>> handful of TLS handshake packets to examine for the test case, so no 
>>>> filter should be necessary.
>>>> 
>>>> 
>>>> HTH,
>>>> 
>>>> Alex.
>>>> 
>>>> 
>>>> 
>>>>>> On Jul 5, 2024, at 08:23, Jonathan Lee <jonathanlee...@gmail.com> wrote:
>>>>>> 
>>>>>> Thanks for the email and support with this. I will get wireshark
>>>>>> running on the client and get the info required. Yes the information
>>>>>> prior is from the firewall side outside of the proxy testing from the
>>>>>> demilitarized zone area. I wanted to test this first to rule that out
>>>>>> as it’s coming in from that first and hits the proxy next Sent from
>>>>>> my iPhone
>>>>>> 
>>>>>>> On Jul 5, 2024, at 06:33, Alex Rousskov 
>>>>>>> <rouss...@measurement-factory.com> wrote:
>>>>>>> 
>>>>>>> On 2024-07-04 19:12, Jonathan Lee wrote:
>>>>>>>> You also stated .. " my current working theory suggests that we are 
>>>>>>>> looking at a (default) signUntrusted use case.”
>>>>>>>> I noticed for Squid documents that default is now set to off ..
>>>>>>> 
>>>>>>> The http_port option you are looking at now is not the directive I was 
>>>>>>> talking about earlier.
>>>>>>> 
>>>>>>>> http_port
>>>>>>>> tls-default-ca[=off]
>>>>>>>> Whether to use the system Trusted CAs. Default is OFF.
>>>>>>>> Would enabling this resolve the problem in Squid 6.6 for error.
>>>>>>> 
>>>>>>> 
>>>>>>> No, the above poorly documented http_port option is for validating 
>>>>>>> _client_ certificates. It has been off since Squid v4 AFAICT. Your 
>>>>>>> clients are not sending client certificates to Squid.
>>>>>>> 
>>>>>>> According to the working theory, the problem we are solving is related 
>>>>>>> to server certificates. http_port tls-default-ca option does not affect 
>>>>>>> server certificate validation. Server certificate validation should use 
>>>>>>> default CAs by default.
>>>>>>> 
>>>>>>> Outside of SslBump, server certificate validation is controlled by 
>>>>>>> tls_outgoing_options default-ca option. That option defaults to "on". I 
>>>>>>> am not sure whether SslBump honors that directive/option though. There 
>>>>>>> are known related bugs in that area. However, we are jumping ahead of 
>>>>>>> ourselves. We should confirm the working theory first.
>>>>>>> 
>>>>>>>> The squid.conf.documented lists it incorrectly
>>>>>>> 
>>>>>>> Squid has many directives and a directive may have many options. One 
>>>>>>> should not use an directive option name instead of a directive name. 
>>>>>>> One should not use an option from one directive with another directive. 
>>>>>>> Squid naming is often inconsistent; be careful.
>>>>>>> 
>>>>>>> * http_port is a directive. tls-default-ca is an option for that 
>>>>>>> directive. It is used for client certificate validation. It defaults to 
>>>>>>> "off" (because client certificates are rarely signed by well-known 
>>>>>>> (a.k.a. "default") CAs preinstalled in many deployment environments).
>>>>>>> 
>>>>>>> * tls_outgoing_options is a directive. default-ca is an option for that 
>>>>>>> directive. It is used for server certificate validation outside of 
>>>>>>> SslBump contexts (at least!). It defaults to "on" (because server 
>>>>>>> certificates are usually signed by well-known (a.k.a. "default") CAs 
>>>>>>> preinstalled in many deployment environments).
>>>>>>> 
>>>>>>> AFAICT, the documentation in question is not wrong (but is 
>>>>>>> insufficient).
>>>>>>> 
>>>>>>> Again, I do not recommend changing any Squid configuration 
>>>>>>> directives/options at this triage state.
>>>>>>> 
>>>>>>> Alex.
>>>>>>> 
>>>> 
>>>> <tlschange.PNG>
>>> 
> 

_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
https://lists.squid-cache.org/listinfo/squid-users

Reply via email to