On 12/10/11 17:33, nipun_mlist Assam wrote:
> This may be relevant to this question.
> While trying to use squid for transparent proxy (tproxy ) on linux
> (kerne 2.6.39 with centos 6.0), I noticed the following
>
> 1. Client IP spoofing doesn't work (but for our work, this requirement
> was a must).
In what way?
> 2. Squid with tproxy doesn't work with HTTPS traffic.
In what way?
HTTP:
http_port 1 tproxy ...
HTTPS:
https_port 2 tproxy ...
>
> I made fixes for both the issues and then above problems were solved.
> I made an assumption that traffic with destination port 443 will be
> always used for HTTPs, and, that I used as an indication to switch
> to SSL on squid side. Squid will transparently listen on two ports,
> one of this port will be used for port 80 traffic and the other for
> port 443 traffic.
You cannot make this assumption. The system administrator has configured
the port (http_port vs https_port) to match the traffic arriving. Both
in Squid and in the firewall. Replacing this manual configuration
automatically with a possibly wrong assumption is not a good thing to do.
Also, Squid does not correctly handle the SSL when it arrives via
interception. Due to not having the SSL security keys which are
installed on the destination web server the client was contacting.
Do not confuse this with a TPROXY failure.
>
> I made the changes in squid 3.2.0.10 code base. I am wondering if
> those fixes are already available somewhere.
>
> Regards,
> Nipun
>
Please first re-check your solution to #2 in light of the https_port
directive and comments above.
Please check that the changes will still apply easily on the latest 3.2
series or 3.HEAD series code.
Then please submit to squid-dev mailing list for review. The submission
guidelines can be found at:
http://wiki.squid-cache.org/MergeProcedure
Amos
-- Please be using Current Stable Squid 2.7.STABLE9 or 3.1.15 Beta testers wanted for 3.2.0.12Received on Wed Oct 12 2011 - 05:35:48 MDT
This archive was generated by hypermail 2.2.0 : Wed Oct 12 2011 - 12:00:02 MDT