Hi, Amos
> What exactly are you trying to achieve with this?
I'm really sorry... It's a little bit difficult to explain...
The following is the more detail.
 -----------------------
     The Internet
        ---+------------
           |
 --------+-+-------------
         |
   +-----+-------+
   |  squid      | (1)
   |  (tcp/8080) |
   +-----+-------+
         |.2
 --------+-+---------------- 10.0.0.0/24
           |.1
        +--+--+
        |  R  |
        +--+--+
           |.1
 -------+--+---------------- 192.168.0.0/24
        |.2
   +----+--------+
   |  squid +    |
   |    tproxy   | (2)
   |  (tcp/8080) |
   +----+--------+
        |.2
 -------+--+---------------- 192.168.1.0/24
           |.3
        +--+-----+
        | client |
        +--------+
 - The demand
   - The client must use proxy(2) using tcp/8080
     - by browser settings
       HTTP  -> proxy(2) (192.168.1.2:8080)
       HTTPS -> proxy(2) (192.168.1.2:8080)
     - proxy(2) don't have to be "transparent"
   - The proxy(2)'s parent proxy must be proxy(1)
     using cache_peer
   - Both proxy(1) and proxy(2) must record
     "client original source address" in access log for security action
         !!! It's most important !!!
I think that I have to use tproxy(not transparent)
to achieve above demands... what do you think ?
Sincerely,
-- Mikio Kishi On Thu, Apr 9, 2009 at 4:54 PM, Amos Jeffries <squid3_at_treenet.co.nz> wrote: > Mikio Kishi wrote: >> >> Hi, Amos >> >>> HTTPS encrypted traffic cannot be intercepted. >> >> Yes, I know that. but, in this case, not "transparent". >> >>> (1) (2) >>> >>> | | >>> +------+ | +------------+ | +---------+ >>> |WWW +---+ | | +----+ WWW | >>> |Client|.2 | .1| squid |.1 | .2| Server | >>> +------+ +-----+ + tproxy +----+ |(tcp/443)| >>> | | (tcp/8080) | | |(tcp/80) | >>> | +------------+ | +---------+ >>> 192.168.0.0/24 10.0.0.0/24 >>> >>> (1) 192.168.0.2 ------> 192.168.0.1:8080 >>> ^^^^^ >>> (2) 192.168.0.2 ------> 10.0.0.2:443 >>> ^^^ >> >> Just only thing I'd like to do is "source address spoofing" >> using tproxy. >> >> Does that make sense ? > > No. Squid is perfectly capable of making HTTPS links outbound without > tproxy. The far end only knows that some client connected. > > HTTPS cannot be spoofed, its part of the security involved with the SSL > layer. > > What exactly are you trying to achieve with this? > > Amos > -- > Please be using > Current Stable Squid 2.7.STABLE6 or 3.0.STABLE13 > Current Beta Squid 3.1.0.6 >Received on Sat Apr 11 2009 - 19:13:05 MDT
This archive was generated by hypermail 2.2.0 : Sun Apr 12 2009 - 12:00:03 MDT