From: Toni Mueller [mailto:[EMAIL PROTECTED]
> > moreover, when you think about it, ftp w/TLS encrypts the control 
> > channel, it's the entire point that 3rd parties (like 
> ftp-proxy) can't 
> > see or modify what's gpoing on, so this cannot possibly work.
> 
> I can't see why this must be so. HTTPS can be proxied with Squid which
> "somehow" handles the crypto stuff after reading the client's "CONNECT
> ...", and digging into FTP+SSL suggests that the control channel could
> be used to break end-to-end encryption into two pieces, originating or
> terminating at the gateway machine.  Eg. the client says "AUTH TLS" to
> start negotiating SSL...

But to my knowledge, squid has no idea what is happening inside of the HTTPS
session, since it is end-to-end encryption, and doesn't proxy the connection
like it does vanilla HTTP; i.e. it just passes the connection through and is
unable to do content inspection and so forth.

Similarly, how would ftp-proxy get around the same limitations? The client
will negotiate the TLS based on the certificate presented by the server; if
the FTP client is instead negotiating with ftp-proxy, it won't be carrying
on a conversation with the trusted certificate presenter. Part of the point
of the TLS security is to protect from MITM anyway.

Could be mistaken, but I think it just inherently isn't going to work.

DS

Reply via email to