Hi,

I need to provide access to a API service exposed on the internet to my 
clients. That API uses a certificate signed by a private CA.
I don't want to trust that private CA in my proxies (lest it gets abused and I 
end up trusting certificates in the proxy that I shouldn't be.  My clients 
would be unaware since I am bumping all the TLS connections unless explicitly 
configured. )
To avoid that I tried ignoring the ssl validation error with  
sslproxy_cert_error directive and then splicing the connection. But its not 
working out.

SubjectCN in that services' certificate is "kube-apiserver"

Ignore settings :

acl broken_kubernetes ssl::server_name kube-apiserver
sslproxy_cert_error allow broken_kubernetes
sslproxy_cert_error deny all


Splicing settings:

acl no_ssl_bump_kubernetes ssl::server_name kube-apiserver
acl step1 at_step SslBump1
acl step2 at_step SslBump2
acl step3 at_step SslBump3
ssl_bump peek step1
ssl_bump splice no_ssl_bump_kubernetes
ssl_bump bump all

Splicing settings are in the lower half of my config.
But I am still getting MITM'ed (bumped) and on the clients, I get a "Not 
Trusted by MyCA" certificate is being shown. Any ideas ?

Regards,
Sarfaraz
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to