Wasn't somebody saying that you'd need write an External ACL to evaluate
the SNI host because dstdomain isn't hooked into that code (yet? ever?)?

On 27 January 2015 at 08:33, Jason Haar <jason_h...@trimble.com> wrote:

>
> Well the documentation says
>
> #   SslBump1: After getting TCP-level and HTTP CONNECT info.
> #   SslBump2: After getting SSL Client Hello info.
> #   SslBump3: After getting SSL Server Hello info.
>
>
> So that means SslBump1 only works for direct proxy (ie CONNECT) sessions,
> it's SslBump2 that peeks into the traffic to discover the client SNI
> hostname. So I think you actually need (I'll use more descriptive acl names
> and comment out those that I think don't add any value)
>
> acl domains_nobump dstdomain "/etc/squid/domains_nobump.acl"
> #no added value: acl DiscoverCONNECTHost at_step SslBump1
> acl DiscoverSNIHost at_step SslBump2
> #don't use - breaks bump: acl DiscoverServerHost at_step SslBump3
> #no added value - in fact forces peek for some reason: ssl_bump peek
> DiscoverCONNECTHost all
> ssl_bump peek DiscoverSNIHost all
>
> ssl_bump splice domains_nobump
> #DiscoverSNIHost should now mean Squid knows about all the SNI details
> ssl_bump bump all
>
> Sadly, this doesn't work for me *in transparent mode*. Works fine when
> using squid as a formal proxy, but when used via https_port intercept, we
> end up with IP address certs instead of SNI certs.
>
> We really need someone who knows more to tell us how to make this work :-(
>
>
> --
> Cheers
>
> Jason Haar
> Corporate Information Security Manager, Trimble Navigation Ltd.
> Phone: +1 408 481 8171
> PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
>
>
> _______________________________________________
> squid-users mailing list
> squid-users@lists.squid-cache.org
> http://lists.squid-cache.org/listinfo/squid-users
>
>
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to