Re: [squid-users] More host header forgery pain with peek/splice

2016-09-05 Thread Amos Jeffries
On 5/09/2016 11:35 a.m., Marcus Kool wrote: > Thanks for your reply. > > The 13-year old child in me says "I want it fixed yesterday" > since false positives are very painful and cannot always > be prevented since the environment where Squid works is > not always that easy to control. > > You men

Re: [squid-users] More host header forgery pain with peek/splice

2016-09-04 Thread Marcus Kool
Thanks for your reply. The 13-year old child in me says "I want it fixed yesterday" since false positives are very painful and cannot always be prevented since the environment where Squid works is not always that easy to control. You mentioned earlier that a fix will probably go in squid 5 which

Re: [squid-users] More host header forgery pain with peek/splice

2016-09-04 Thread Amos Jeffries
On 31/08/2016 5:25 a.m., Marcus Kool wrote: > Do I understand it correctly that Squid in normal proxy mode > allows malware to do a CONNECT to any destination, while in > transparent proxy mode does extra security checks which causes > some regular (non-malware) clients to fail? Intercepted traff

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-30 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 And this one: http://wiki.squid-cache.org/ConfigExamples/Intercept/CiscoIOSv15Wccp2 of course. 30.08.2016 23:25, Marcus Kool пишет: > Do I understand it correctly that Squid in normal proxy mode > allows malware to do a CONNECT to any destinati

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-30 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 31.08.2016 1:24, Yuri Voinov пишет: > > > > 30.08.2016 23:25, Marcus Kool пишет: > > Do I understand it correctly that Squid in normal proxy mode > > allows malware to do a CONNECT to any destination, while in > > transparent proxy mode does extr

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-30 Thread Yuri Voinov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 30.08.2016 23:25, Marcus Kool пишет: > Do I understand it correctly that Squid in normal proxy mode > allows malware to do a CONNECT to any destination, while in > transparent proxy mode does extra security checks which causes > some regular (non

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-30 Thread Marcus Kool
Do I understand it correctly that Squid in normal proxy mode allows malware to do a CONNECT to any destination, while in transparent proxy mode does extra security checks which causes some regular (non-malware) clients to fail? And philosophical questions: is Squid the right tool to stop malware?

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-30 Thread Amos Jeffries
On 26/08/2016 4:17 a.m., Steve Hill wrote: > > This one just seems to keep coming up and I'm wondering how other people > are dealing with it: > > When you peek and splice a transparently proxied connection, the SNI > goes through the host validation phase. Squid does a DNS lookup for the > SNI,

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-30 Thread Amos Jeffries
On 26/08/2016 6:34 a.m., reinerotto wrote: > Hack the code. Because it is even worse, as firefox for example does not obey > to the TTL. > It is not that simple. The checks are there for very good reason(s) related to security of the network using the proxy. The Host forgery issue being checked

Re: [squid-users] More host header forgery pain with peek/splice

2016-08-25 Thread reinerotto
Hack the code. Because it is even worse, as firefox for example does not obey to the TTL. -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/More-host-header-forgery-pain-with-peek-splice-tp4679178p4679181.html Sent from the Squid - Users mailing list archive a

[squid-users] More host header forgery pain with peek/splice

2016-08-25 Thread Steve Hill
This one just seems to keep coming up and I'm wondering how other people are dealing with it: When you peek and splice a transparently proxied connection, the SNI goes through the host validation phase. Squid does a DNS lookup for the SNI, and if it doesn't resolve to the IP address that th