On 31/03/18 11:41, squid wrote:
> We are using squid as reverse proxy and we have disabled SSLv3 :
> 
> https_port ... 
> options=NO_SSLv2,NO_SSLv3,SINGLE_DH_USE,CIPHER_SERVER_PREFERENCE 
> cipher=ECDHE-ECDSA . . .. dhparams=/etc/...dhparams.pem

NP: Squid-3.5 or later is required for EC cipher support.


> 
> Using Nessus scanning tool, it reports that SSLv3 is enabled, but not SSLv2.  
>  Looking at the ssl handshake client hello and server hellos is does seem 
> that the sslv3 is being used.  Is there something that we are missing?
> 
> Version of Squid  (3.1) is stock RH6 which I know is old, but for now we need 
> to use.  We will be upgrading to RH7, but it may be a little while so I'd 
> like to get this solved. 
> 
> Secure Sockets Layer
>     SSLv3 Record Layer: Handshake Protocol: Server Hello
>         Content Type: Handshake (22)
>         Version: SSL 3.0 (0x0300)
>         Length: 74
>         Handshake Protocol: Server Hello
>             Handshake Type: Server Hello (2)
>             Length: 70
>             Version: SSL 3.0 (0x0300)
>             Random: 5aa83ae26555f6dcc7042c341d090c6715a243a7be05d69b...
>             Session ID Length: 32
>             Session ID: 44bb10e985c067cc987bf2e698d458dd37d2b3c469ce9fe7...
>             Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)
>             Compression Method: null (0)

Which of the TCP connections was that hello performed on?

You have apparently only disabled SSLv3 on the client->Squid connection.
No information is provided about the Squid->server settings
(sslproxy_options).


Also, these options are handled by OpenSSL. They only work if the
library Squid was built against supports them.

Amos
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to