Re: [squid-users] {Disarmed} Re: site cannot be accessed

2015-01-12 Thread Eliezer Croitoru
Hey, Did you had the chance to see this page: http://findproxyforurl.com/example-pac-file/ Eliezer On 13/01/2015 06:22, Simon Dcunha wrote: Dear Sarfraz, appreciate your immediate reply Heres attached is my pac file i am accessing the 10.101.101.10 server regards simon

[squid-users] {Disarmed} Re: site cannot be accessed

2015-01-12 Thread Simon Dcunha
Dear Sarfraz, appreciate your immediate reply Heres attached is my pac file i am accessing the 10.101.101.10 server regards simon From: "***some text missing***" To: "simon" , "squid-users" Sent: Monday, January 12, 2015 1:18:06 PM Subject: {Disarmed} Re: [squi

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Eliezer Croitoru
Hey hack, From the comments in the past I am unsure what you are after... If you are using ssl-bump you should first learn about how ssl works and about the differences between encrypted traffic to verification of a public key. I must admit that these topic are not marked as an easy one. Since

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
how it didnt work while i found articles in google saying that it work for them like this one: http://www.linuxquestions.org/questions/linux-server-73/ssl-intermediate-chain-warning-917476/ -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-cert-wiki-tp46690

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Amos Jeffries
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 13/01/2015 12:00 a.m., HackXBack wrote: > in this case the clear question is what https_port line must > contain ? > The basic config for a reverse proxy is supposed to be just this: https_port 443 accel no-vhost \ defaultdomain=example.com

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Amos Jeffries
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 13/01/2015 1:15 a.m., Yuri Voinov wrote: > > Yep. > > Memory leaking - if it really it - will be occurs on all > platforms. > > If not - this is OS-specific issue. libc, malloc library problem. > But not squid itself. > By definition a memory l

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yep. Memory leaking - if it really it - will be occurs on all platforms. If not - this is OS-specific issue. libc, malloc library problem. But not squid itself. 12.01.2015 18:06, Eugene M. Zheganin пишет: > Hi. > > On 12.01.2015 16:41, Eugene M.

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yep. Memory leaking - if it really it - will be occurs on all platforms. If not - this is OS-specific issue. libc, malloc library problem. But not squid itself. 12.01.2015 18:06, Eugene M. Zheganin пишет: -BEGIN PGP SIGNATURE- Version:

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Eugene M. Zheganin
Hi. On 12.01.2015 16:41, Eugene M. Zheganin wrote: > I'm now also having a strong impression that squid is leaking memory. > Now, when 3.4.x is able to handle hundreds of users during several > hours I notice that it's memory usage is constantly increasing. My > patience always ends at the point o

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yep :) 12.01.2015 17:53, Eliezer Croitoru пишет: > Hey, > > This is not a reverse proxy... > It's a ssl-bump server and which you cannot use any bought certificate for it. > > Eliezer > > On 12/01/2015 13:20, HackXBack wrote: >> https_port 3127 inte

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Eliezer Croitoru
Hey, This is not a reverse proxy... It's a ssl-bump server and which you cannot use any bought certificate for it. Eliezer On 12/01/2015 13:20, HackXBack wrote: https_port 3127 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=4MB cert=/etc/squid/ssl_cert/CA.pem ke

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Looks like an OS-specific issue. I don't see any memory leaking on my boxes (running Solaris 10, yes ;)). Moreover, helpers is corrrectly got an release memory. 12.01.2015 17:41, Eugene M. Zheganin пишет: > Hi. > > On 09.01.2015 06:12, Amos Jeffrie

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Eugene M. Zheganin
Hi. On 09.01.2015 00:10, Doug Sampson wrote: > Man, I empathize with you. Have you tried running Squid 3.4.x on > FreeBSD 9.3? Sometimes I wonder if it's FreeBSD 10.x that's causing > the issue... It's not. FreeBSD 9.x branch was a crappy release from it's start. Eugene. _

Re: [squid-users] Memory Leak Squid 3.4.9 on FreeBSD 10.0 x64

2015-01-12 Thread Eugene M. Zheganin
Hi. On 09.01.2015 06:12, Amos Jeffries wrote: > Grand total: > => 9.5 GB of RAM just for Squid. > > .. then there is whatever memory the helper programs, other software > on the server and operating system all need. > I'm now also having a strong impression that squid is leaking memory. Now, whe

Re: [squid-users] 3.3.x -> 3.4.x: huge performance regression

2015-01-12 Thread Eugene M. Zheganin
Hi. On 12.01.2015 16:03, Eugene M. Zheganin wrote: > Hi. > > Just to point this out in the correct thread - to all the people who > replied here - Steve Hill has provided a patch for a 3.4.x that solves > the most performance degradation issue. 3.4.x is still performing poorly > comparing to the 3

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 AFAIK, you can't be use SERVER certificate (almost signed trusted CA) for SSL bumping. You need root CA exactly. Self-signed root CA. 12.01.2015 17:28, HackXBack пишет: > if it is self-signed CA certificate + import to browser > then it will worke

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
if it is self-signed CA certificate + import to browser then it will worked but if it is Trusted CA cert it giving me error like i said in first post -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-cert-wiki-tp4669016p4669037.html Sent from the Squid - Us

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The similar like me config. It is HTTP/HTTPS interception proxy, right? Try to create your own self-signed CA certificate (without CN field, leave it empty), and try to connect via browser. Don't forget to install publick key from your certificate t

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
https_port 3127 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=4MB cert=/etc/squid/ssl_cert/CA.pem key=/etc/squid/ssl_cert/testkey.pem http_port 3129 http_port 3128 intercept where CA.pem is from trusted CA authoroties -- View this message in context: http://s

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 May I take a look on your squid.conf? Looks like you incorrect configure your proxy. 12.01.2015 17:07, HackXBack пишет: > i dont know where you take me but my problem is not in any command ! > i used trusted cert that got it from trusted CA > but w

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
i dont know where you take me but my problem is not in any command ! i used trusted cert that got it from trusted CA but when i use it in https_port the browser give error like i mentioned in my first post -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-c

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
okay great so what is my issue ? -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-cert-wiki-tp4669016p4669032.html Sent from the Squid - Users mailing list archive at Nabble.com. ___ squid-users mailing list squi

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Eliezer Croitoru
Are you using the command with facebook.com??? You should use your own server... Eliezer On 12/01/2015 13:02, HackXBack wrote: openssl s_client -connect facebook.com:443 -CApath /var/squid/ssl_db/certs CONNECTED(0003) depth=2 C = US, O = DigiCert Inc, OU =www.digicert.com, CN = DigiCert Hig

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yep, openssl is ok and works. 12.01.2015 17:02, HackXBack пишет: > openssl s_client -connect facebook.com:443 -CApath /var/squid/ssl_db/certs > CONNECTED(0003) > depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert High > Assur

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
openssl s_client -connect facebook.com:443 -CApath /var/squid/ssl_db/certs CONNECTED(0003) depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert High Assurance EV Root CA verify return:1 depth=1 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert High Assurance CA-3

Re: [squid-users] 3.3.x -> 3.4.x: huge performance regression

2015-01-12 Thread Eugene M. Zheganin
Hi. Just to point this out in the correct thread - to all the people who replied here - Steve Hill has provided a patch for a 3.4.x that solves the most performance degradation issue. 3.4.x is still performing poorly comparing to the 3.3.x branch, but I guess this is due to major code changes. As

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
in this case the clear question is what https_port line must contain ? -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-cert-wiki-tp4669016p4669027.html Sent from the Squid - Users mailing list archive at Nabble.com. __

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://i.imgur.com/uFKQz5b.png You got an error 20 because of your openssl client does not see any CA certs. To avoid that need to specify CA's. openssl s_client -connect facebook.com:443 -CApath 12.01.2015 16:55, HackXBack пишет: > what you mea

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
what you mean by specify -CAPath with trusted root CA's -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-cert-wiki-tp4669016p4669025.html Sent from the Squid - Users mailing list archive at Nabble.com. ___ squid-

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You need to specify -CAPath with trusted root CA's from openssl installation to avoid error 20. :) But looks like openssl connect works. 12.01.2015 16:50, HackXBack пишет: > openssl s_client -connect facebook.com:443 > CONNECTED(0003) > depth=1

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
openssl s_client -connect facebook.com:443 CONNECTED(0003) depth=1 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert High Assurance CA-3 verify error:num=20:unable to get local issuer certificate verify return:0 --- Certificate chain 0 s:/C=US/ST=CA/L=Menlo Park/O=Facebook, Inc./C

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Eliezer Croitoru
Can you try to use openssl s_client? an exapmple: "openssl s_client -connect facebook.com:443" Eliezer On 12/01/2015 11:41, HackXBack wrote: hello, according to this chapter http://wiki.squid-cache.org/ConfigExamples/Reverse/SslWithWildcardCertifiate i bought signed certificate but no one acc

Re: [squid-users] site cannot be accessed

2015-01-12 Thread ***some text missing***
Share your PAC file please. Regards,Sarfraz                  From: Simon Dcunha To: squid-users Sent: Monday, January 12, 2015 11:41 AM Subject: [squid-users] site cannot be accessed Dear All, I have squid-3.1.10-22.el6_5.x86_64 running on centos 6.5 64 bit for quite sometime an

Re: [squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
yes you are right -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/ssl-cert-wiki-tp4669016p4669020.html Sent from the Squid - Users mailing list archive at Nabble.com. ___ squid-users mailing list squid-users@lists.s

Re: [squid-users] ssl cert wiki

2015-01-12 Thread Eliezer Croitoru
Just to make sure I understand it right. The certificate is for a reverse proxy? Eliezer On 12/01/2015 11:41, HackXBack wrote: hello, according to this chapter http://wiki.squid-cache.org/ConfigExamples/Reverse/SslWithWildcardCertifiate i bought signed certificate but no one accept rsa:1024 s

Re: [squid-users] site cannot be accessed

2015-01-12 Thread Natxo Asenjo
On Mon, Jan 12, 2015 at 7:41 AM, Simon Dcunha wrote: > if I uncheck the proxy option in the browser the site works fine > the above users also use internet and is working fine > > I am using the pac file to bypass local sites and the local intranet > websites are alredy added in the pac file > >

[squid-users] site cannot be accessed

2015-01-12 Thread Simon Dcunha
Dear All, I have squid-3.1.10-22.el6_5.x86_64 running on centos 6.5 64 bit for quite sometime and working fine just a couple of days back some users reported an issue i have a intranet site which just stopped working . if I uncheck the proxy option in the browser the site works fine the above u

[squid-users] ssl cert wiki

2015-01-12 Thread HackXBack
hello, according to this chapter http://wiki.squid-cache.org/ConfigExamples/Reverse/SslWithWildcardCertifiate i bought signed certificate but no one accept rsa:1024 so i generate the key with rsa:2048 after i got my crt from them https_port 443 cert=/usr/newrprgate/CertAuth/signed.crt key=/usr/