If that's the case, would there be any possible way for me to get the decrypted 
packets?


On Feb 5, 2012, at 2:37 PM, James R. Leu wrote:

> I do not have sslbump working yet, but as I understand it the packets
> on the wire are always encrypted.  The only place the information exists
> in a decrypted form is in squids memory.  Just think of squid as a bridge
> between two SSL streams.
> 
> On Sun, Feb 05, 2012 at 02:12:44PM -0500, PS wrote:
>> I tried using ssldump and tshark and I can't seem to get this working. I am 
>> using squid's private key to try to decrypt the traffic.
>> 
>> The connection goes from the client (192.168.2.2) to squid server 
>> (192.168.2.1) on port 3128. If I understand correctly, the client 
>> establishes a connection with squid on port 3128 and then squid establishes 
>> a connection with https://www.gmail.com on port 443.
>> 
>> Shouldn't I be able to decrypt the connection between the client and the 
>> squid server in order to see the traffic that is being sent to gmail?
>> 
>> On Feb 3, 2012, at 2:08 PM, "Alfonso Alejandro Reyes Jimenez" 
>> <[email protected]> wrote:
>> 
>>> Sorry. SSLDUMP is like tcpdump but for ssl, it Works on layer 3 and has 
>>> nothing to do with squid, that what we use.
>>> 
>>> Regards.
>>> 
>>> 
>>> 
>>> -----Mensaje original-----
>>> De: PS [mailto:[email protected]] 
>>> Enviado el: viernes, 03 de febrero de 2012 12:56 p.m.
>>> Para: Alfonso Alejandro Reyes Jimenez
>>> CC: [email protected]
>>> Asunto: Re: [squid-users] Capturing HTTPS traffic
>>> 
>>> Could you please be a little more specific? Is there something else called 
>>> ssldump that I am supposed to use?
>>> 
>>> This is what my config looks like. I am currently using ssl_bump.
>>> 
>>> 
>>> acl localnet src 10.0.0.0/8    # RFC1918 possible internal network
>>> acl localnet src 172.16.0.0/12    # RFC1918 possible internal network
>>> acl localnet src 192.168.0.0/16    # RFC1918 possible internal network
>>> acl localnet src fc00::/7       # RFC 4193 local private network range
>>> acl localnet src fe80::/10      # RFC 4291 link-local (directly plugged) 
>>> machines
>>> acl SSL_ports port 443
>>> acl Safe_ports port 80        # http
>>> acl Safe_ports port 21        # ftp
>>> acl Safe_ports port 443        # https
>>> acl Safe_ports port 70        # gopher
>>> acl Safe_ports port 210        # wais
>>> acl Safe_ports port 1025-65535    # unregistered ports
>>> acl Safe_ports port 280        # http-mgmt
>>> acl Safe_ports port 488        # gss-http
>>> acl Safe_ports port 591        # filemaker
>>> acl Safe_ports port 777        # multiling http
>>> acl CONNECT method CONNECT
>>> http_access allow localhost manager
>>> http_access deny manager
>>> http_access deny !Safe_ports
>>> http_access deny CONNECT !SSL_ports
>>> http_access allow localnet
>>> http_access allow localhost
>>> http_access deny all
>>> http_port 3128 ssl-bump generate-host-certificates=on 
>>> dynamic_cert_mem_cache_size=4MB  cert=/usr/local/squid/ssl_cert/squid.pem
>>> always_direct allow all
>>> ssl_bump allow all
>>> sslproxy_cert_error allow all
>>> sslproxy_flags DONT_VERIFY_PEER
>>> coredump_dir /usr/local/squid/var/cache/squid
>>> refresh_pattern ^ftp:        1440    20%    10080
>>> refresh_pattern ^gopher:    1440    0%    1440
>>> refresh_pattern -i (/cgi-bin/|\?) 0    0%    0
>>> refresh_pattern .        0    20%    4320
>>> logformat squid %ts.%03tu %6tr %>a %Ss/%03>Hs %<st %rm %ru %un %Sh/%<A %mt 
>>> access_log /usr/local/squid/var/logs/access.log squid
>>> 
>>> Thanks for the quick response!
>>> 
>>> On Feb 3, 2012, at 1:20 PM, Alfonso Alejandro Reyes Jimenez wrote:
>>> 
>>>> Hi.
>>>> 
>>>> If you have the certifícate information you may use ssldump to decode the 
>>>> information. I hope this helps.
>>>> 
>>>> 
>>>> Regards.
>>>> 
>>>> -----Mensaje original-----
>>>> De: PS [mailto:[email protected]] Enviado el: viernes, 03 de 
>>>> febrero de 2012 12:11 p.m.
>>>> Para: [email protected]
>>>> Asunto: [squid-users] Capturing HTTPS traffic
>>>> 
>>>> Hello,
>>>> 
>>>> I am currently running the following version of Squid:
>>>> 
>>>> Squid Cache: Version 3.2.0.14-20120202-r11500 configure options:  
>>>> '--enable-ssl' '--enable-ssl-crtd'
>>>> 
>>>> I configured it so that certs are generated on the fly and I am able to 
>>>> get to HTTPS websites without getting a certificate warning.
>>>> 
>>>> I want to do a packet capture of all HTTPS traffic while in cleartext. I 
>>>> would think that it can be done on the Squid box. Is that possible?
>>>> 
>>>> If I use tcpdump on the Squid box, I only see the encrypted traffic. Do I 
>>>> have to recompile Squid with another configuration option to be able to do 
>>>> what I want to do?
>>>> 
>>>> Thanks
>>> 
> 
> -- 
> James R. Leu
> [email protected]

Reply via email to