Looks like your SSL library does not contain SSLv3 protocol support
already, but site announce it.
27.06.2016 20:42, Renato Jop пишет:
I removed the NO_SSLv2, NO_SSLv3 however, right before the
SSL3_GET_RECORD:wrong version number the SSL
routines:SSL23_GET_SERVER_HELLO:unknown protocol is shown.
Renato Jop
On Mon, Jun 27, 2016 at 8:29 AM, Yuri <yvoi...@gmail.com
<mailto:yvoi...@gmail.com>> wrote:
Try to remove NO_SSLv2,NO_SSLv3 from options. SSLv2 already not
supported everywhere, RC4/3DES is SSLv3 ciphers, so it can be
confuse software. I.e., you use custom ciphers/protocols
combinations, which can lead issue.
27.06.2016 20:25, Renato Jop пишет:
Thank you both for your valuable help.
I've configured the tls-dh param with a strong Diffie-Hellman
group (2048 bits) and configured the cipher as Yuri specified and
I was able to get pass the unknown cipher, however now I get a
"SSL routines:SSL3_GET_RECORD:wrong version number". Here's the
configuration I changed:
cipher=HIGH:MEDIUM:RC4:3DES:!aNULL:!eNULL:!LOW:!MD5:!EXP:!PSK:!SRP:!DSS
dhparams=/etc/dh-parameters.2048
options=NO_SSLv2,NO_SSLv3,SINGLE_DH_USE
tls-dh=/usr/local/etc/squid/dhparams.pem
Renato Jop
On Sat, Jun 25, 2016 at 11:34 AM, Yuri Voinov <yvoi...@gmail.com
<mailto:yvoi...@gmail.com>> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
25.06.2016 <tel:25.06.2016> 23:09, Amos Jeffries пишет:
> On 26/06/2016 4:32 a.m., Yuri Voinov wrote:
>>
>> Amos, you are a wrong.
>>
>> No Squid-4. It's unstable and not ready for production.
Whenever it's
>> features.
>
> So some beta software has bugs therefore nobody should ever
use it for
> anything. I find that to be a strange and sad view of the
world.
>
> Care to guess why I listed it as the last option amongst
several?
> Or why 4.0.11 exists as a beta still?
> It *is* an option for the mentioned problem(s) though
whatever its
utility.
Agreed.
>
>
>
>>
>> Some time ago I have the same issue and know what happens
exactly.
>>
>> Skype initial connection site uses RC4 cipher. Which is
disabled in most
>> squid's configuration.
>
> Your "know what happens exactly" differs from at least two
other peoples
> debugging experiences with Skype.
>
> RC4 is on the hitlist for most of the big vendors for the
past year or
> so. IIRC there were several Windows Updates to remove it
and other
> broken bits from a lot of things over the past year.
> If Skype is still using RC4 it might be part of this problem.
I'm sure this is problem and this problem exists. MS do
nothing to make
they sites/services more secure. BTW, MS Updates uses RC4
ciphers itself
this time. With strong siphers there is no way to setup WU
via Squid.
I've spent much time to identify this problem in my setup and
find
working workaround.
Another part of problem is: MS often uses it's own
self-signed roots,
which is exists in Windows, but nowhere else. And which has not
cross-signed by well-known root CA's. They think it make MS
services
more secure. They wrong. But we can't do anything with it.
So, this is
forced us to add self-signed MS roots to our Squid's CA
bundles to
bump/splice.
>
>
>>
>> To make it works (as by as most M$ update sites) it's
require simple use
>> this cipher's suite:
>>
>>
HIGH:MEDIUM:RC4:3DES:!aNULL:!eNULL:!LOW:!MD5:!EXP:!PSK:!SRP:!DSS
>>
>> That works for me in 5 SSL bumped setups. There is no
matter which squid
>> version installed.
>
> Thank you. Thats another option then. I'd rate that below
trying the EC
> ciphers, and above library updates.
You are welcome.
Just for information: MS has own IT infrastructure, with some
strange
configured and non well-managed elements. I can't guarantee this
workaround will work everywhere or for every MS service.
When I made my research, I've seen some strange security TLS
combinations on MS sites/services. I.e., for example,
RC4+ECDSA+TLSv1.2.
Or, for example, RC4+MD5+TLSv1. And some similar. Very
idiotic and
potentially dangerous combinations. And - they support
ignores all
requests. As usual.
To my regret, I can not order all of its users to abandon the
use of
Windows. So far, in my infrastructure have machines with
Windows XP.
With this nothing can be done, it is necessary only to weaken the
security - for the sake of compatibility.
>
>
> Amos
> _______________________________________________
> squid-users mailing list
> squid-users@lists.squid-cache.org
<mailto:squid-users@lists.squid-cache.org>
> http://lists.squid-cache.org/listinfo/squid-users
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJXbsC5AAoJENNXIZxhPexGiFoH/jrtimBNppF1uHpVTNwOO10z
yF2APMA56S8woNZzhUNjT8+oJFPrthnMoQFrqgicjS77SBAFp9KcOV+SxOKl9+sW
OdAHDPuCD7dGnKzAdFDR1YR7Vp5IpElP1rFO5rqKXeBc3iKjq65BfF+T6atHy6cS
0VAaluvqvHQps2wVKoYxGURDf3Y2K0lJn+qF+s2CaBwEufhzgKSvG0aUIDqTfHfK
3EMQTpPtlTqm+pcexR+oZM1WE1hlES1khOXs51fgo6puPryqWJiHGvO4EBEfWoXF
Skval2COzcdzMvC5jjfGbMEPNGNJrYUeq/KNgppRvE2wQJ+gCLYG317decKHty0=
=8BTp
-----END PGP SIGNATURE-----
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
<mailto:squid-users@lists.squid-cache.org>
http://lists.squid-cache.org/listinfo/squid-users
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users