Hi all,
is there any chance to make a copy of the actual decrypted traffic,
and send it to a kind of virtual ethernet interface?, I want to
analyze this traffic with other tools like BRO IDS or Suricata.
Anyone with some ideas?
Regards,
--
Saludos,
Hugo Saavedra
-12-06 16:56 GMT-03:00 Hugo Saavedra :
> solution finded: we commented the sslproxy_cipher line and it works!
> is there any security issues if we left the default options for this variable?
>
> thanks
> Hugo
>
> 2017-12-06 16:21 GMT-03:00 Alex Rousskov :
>> On 12/06/2
solution finded: we commented the sslproxy_cipher line and it works!
is there any security issues if we left the default options for this variable?
thanks
Hugo
2017-12-06 16:21 GMT-03:00 Alex Rousskov :
> On 12/06/2017 12:06 PM, Hugo Saavedra wrote:
>> 2017/12/06 16:02:37 kid1| Error ne
7; processes
2017/12/06 16:02:37 kid1| Error negotiating SSL connection on FD 61:
error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert unknown ca
(1/0)
Best,
Hugo
2017-12-06 15:54 GMT-03:00 Alex Rousskov :
> On 12/06/2017 11:45 AM, Hugo Saavedra wrote:
>
>> Currently we have cache.log di
ps and check if squid gives you an error
> message.
>
> Did you check the cache.log as well?
>
> Br Enrico
>
> Am 6. Dezember 2017 17:38:24 MEZ schrieb Hugo Saavedra
> :
>>
>> Hi All,
>>
>> We have the following setup of a transparent squid box:
>
Hi All,
We have the following setup of a transparent squid box:
OS: CentOS release 6.9 (Final)
Squid Cache: Version 3.5.26-20170625-r14174
Compile options:
'--with-included-ltdl' '--enable-icap-client'
'--enable-delay-pools' '--with-openssl' '--enable-ssl-crtd'
'--enable-icmp' '--enable-snmp' '