On 07/28/2013 05:21 PM, Amos Jeffries wrote:
> On 29/07/2013 2:30 a.m., Eliezer Croitoru wrote:
>> On 07/28/2013 03:37 PM, csn233 wrote:
>>> To intercept HTTPS traffic, is SSL-bump a must? Even when I only want
>>> to record the CONNECT traffic in access.log just like a normal forward
>>> proxy without decrypting anything?
>>>
>>> Is this any different with TPROXY?
>>>
>> Indeed SSL-bump is a must..
>> You will be able to record the CONNECT traffic when using:
>> "sslbump deny all" like acl.

   ssl_bump none all

You will not be decrypting or bumping any traffic with this, but you
will be using a little bit of code introduced by the SslBump-related
projects.


> Beyond the minor fact that there should be *no* CONNECT traffic on
> intercepted port 80 or port 443 because CONNECT is a client-to-proxy
> request method - which should only be seen on port 3128 or similar HTTP
> proxy ports.

To be more precise, there are actually a few CONNECT requests inside
real-world intercepted traffic, but a non-bumping Squid which assumes
that the traffic is SSL will not see any of those CONNECTS as it will
blindly forward them to where they were going.


> The current releases of Squid (3.3.8 and 3.4.0.1) should take
> intercepted port-443 traffic and relay it untouched if there is no
> decrypting done. They may convert it into a CONNECT if the traffic needs
> relaying to a cache_peer, but otherwise it is just tunneled along to the
> original destination server.

Please note that tunneling intercepted but not bumped traffic through
cache_peers (via CONNECT) is officially supported only in v3.4 (added as
trunk r12905 dated 2013-06-10).


HTH,

Alex.

Reply via email to