Re: ssl-bump squid3/src client_side_request.cc,1.80, 1.80.2.1 client_side_request.h,1.30,1.30.6.1

From: Amos Jeffries <squid3@dont-contact.us>
Date: Tue, 6 Nov 2007 12:24:02 +1300 (NZDT)

> Update of cvs.devel.squid-cache.org:/cvsroot/squid/squid3/src
>
> Modified Files:
> Tag: ssl-bump
> client_side_request.cc client_side_request.h
> Log Message:
> Switch to SslBump mode when a CONNECT request is detected. Will need to
> add an
> on/off switch or an ACL to control which CONNECT requests should be lifted
> off
> the wire and into Squid (creating a "bump on the wire").
>
> When SslBump is activated, Squid responds to CONNECT request with HTTP 200
> "Connection established" and switches to SSL encryption on the connection.
>
> This code appears to work in limited tests, but it relies on https_port
> being
> set (to get SSL certificates and related info) even though no requests
> reach
> that port in those tests. There are many other hacks that need to be
> polished
> or removed.

It makes sense to consider the https_port as the explicit *incoming*
address for SSL connections.
I would propose an option in line with the other components:
    ssl_outgoing_address a.b.c.d
with options such as cert, keyfile etc identical in name and purpose to
https_port but that configure a specific server-side certificate for
squids bumped outbound links (MAY be the same as the inbound https_port
ones), these could apply to bump'd requests and to other outbound SSL
links.

Amos
Received on Mon Nov 05 2007 - 16:24:06 MST

This archive was generated by hypermail pre-2.1.9 : Sat Dec 01 2007 - 12:00:05 MST