I think we can use MD5/SHA1/SHA256 or even CRC32 to show the "freshness" of the 
certificate.
Also this way the ssl_db folder will be free of the burden of tight 600 or 700 
permissions.

Did I got it right?

Thanks,
Eliezer

----
Eliezer Croitoru
Linux System Administrator
Mobile: +972-5-28704261
Email: elie...@ngtech.co.il



-----Original Message-----
From: Alex Rousskov [mailto:rouss...@measurement-factory.com] 
Sent: Thursday, July 19, 2018 11:29 PM
To: Eliezer Croitoru <elie...@ngtech.co.il>; 'Squid Users' 
<squid-users@lists.squid-cache.org>
Subject: Re: [squid-users] question about squid and https connection .

On 07/19/2018 12:08 PM, Eliezer Croitoru wrote:

> So the ROOT CA key which squid is using is being used for all the fake 
> certificates, why do we need so many copies of it?

FWIW, I cannot think of any reason to store the CA certificate key in
the database of generated certificates. That key is only used to sign a
freshly generated certificate, and the certificate generator never
regenerates certificates, so I do not see the need to reuse that CA key.

Alex.


> -----Original Message-----
> From: Alex Rousskov [mailto:rouss...@measurement-factory.com]
> Sent: Wednesday, July 18, 2018 11:45 PM
> To: Eliezer Croitoru <elie...@ngtech.co.il>; 'Squid Users' 
> <squid-users@lists.squid-cache.org>
> Subject: Re: [squid-users] question about squid and https connection .
> 
> On 07/18/2018 02:23 PM, Eliezer Croitoru wrote:
> 
> 
>> Every certificate have the same properties of the original one except 
>> the "RSA key" part which it's certifiying.
> 
> Assuming you are talking about the generated certificates for the same real 
> certificate X, then yes, they will all have the same (mimicked) fields. 
> Whether they will be signed by the same CA depends on Squid configuration. In 
> my answers, I assumed that all those Squids are configured with the same CA 
> (including the same private key).
> 
> 
>> So what I'm saying is that you cannot say that every certificate which 
>> will be created with the same CA will be the same for two different 
>> 2048 bits RSA keys.
> 
> ... unless the keys are also the same, which was my and, AFAICT, OP 
> assumption.
> 
> Also, unless you are doing something nasty, it probably does not make sense 
> to configure a bumping Squid with a public CA certificate that is identical 
> to some other public CA certificate but has a different private key. In other 
> words, if you are using 200 Squids with a single public CA certificate, then 
> all those Squids should use the same private key.
> 
> Alex.
> 
> 
> 
>> -----Original Message-----
>> From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] 
>> On Behalf Of Alex Rousskov
>> Sent: Friday, July 13, 2018 2:01 AM
>> To: 'Squid Users' <squid-users@lists.squid-cache.org>
>> Subject: Re: [squid-users] question about squid and https connection .
>>
>> On 07/12/2018 02:35 PM, Eliezer Croitoru wrote:
>>
>>> Every RSA key and certificate pair regardless to the origin server 
>>> and the SSL-BUMP enabled proxy can be different.
>>
>> I cannot find a reasonable interpretation of the above that would 
>> contradict what I have said. Yes, each unique certificate has its own 
>> private key, but that is not what Ahmad was asking about AFAICT.
>>
>>
>>> Will it be more accurate to say that just as long as these 200 squid 
>>> instances(different squid.conf and couple other local variables) use 
>>> the same exact ssl_db cache directory  then it's probable that they 
>>> will use the same certificate.
>>
>> That statement is incorrect. Squids configured with different CA 
>> certificates will generate different fake certificates for the same 
>> real certificate.
>>
>> I assume that Ahmad was asking about a situation where 200 Squid 
>> instances had the same configuration (including CA certificates).
>>
>> Please note that the certificate generator helper gets the signing 
>> (CA) certificate as a parameter with each generation request (because 
>> different Squid ports may use different CA certificates). Also, Squid 
>> probably does not officially support sharing the certificate directory 
>> across Squid instances (even if it works).
>>
>>
>>> Or these 200 squid instances are in SMP mode with 200 workers... If 
>>> these 200 instances do not share memory and certificate cache then 
>>> there is a possibility that the same site from two different sources 
>>> will serve different certificates(due to the different RSA key which 
>>> is different).
>>
>> 200 SMP workers or 200 identically-configured Squid instances will 
>> generate the same fake certificates for the same real certificate.
>> "Stable certificates" is an important requirement for many distributed 
>> Squid deployments.
>>
>> Alex.
>>
>>
>>
>>> -----Original Message-----
>>> From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] 
>>> On Behalf Of Alex Rousskov
>>> Sent: Thursday, July 12, 2018 11:27 PM
>>> To: --Ahmad-- <ahmed.za...@netstream.ps>; Squid Users 
>>> <squid-users@lists.squid-cache.org>
>>> Subject: Re: [squid-users] question about squid and https connection .
>>>
>>> On 07/12/2018 01:17 PM, --Ahmad-- wrote:
>>>
>>>> if i have pc# 1 and that pc open facebook .
>>>>
>>>> then i have other pc # 2 and that other pc open facebook .
>>>>
>>>>
>>>> now  as we know facebook is https .
>>>>
>>>> so is the key/ cert that used on pc # 1 is same as cert in pc # 2 to 
>>>> decrypt the fb encrypted traffic ?
>>>
>>> Certificates themselves are not used (directly) to decrypt traffic 
>>> AFAIK, but yes, both PCs will see the same server certificate 
>>> (ignoring CDNs and other complications).
>>>
>>>
>>>
>>>> now in the presence of squid .
>>>>
>>>> if i used tcp connect method  , will it be different than above ?
>>>
>>> If you are not bumping the connection, then both PCs will see the 
>>> same real Facebook certificate as if those PCs did not use a proxy.
>>>
>>> If you are bumping the connection, then both PCs will see the same 
>>> fake certificate generated by Squid.
>>>
>>>
>>>
>>>> say i used 200 proxies in same squid machine and i used to access FB from 
>>>> the same pc same browser .
>>>>
>>>> will facebook see my cert/key i used to decrypt its traffic ?
>>>
>>> If you are asking whether Facebook will know anything about the fake 
>>> certificate generated by Squid for clients, then the answer is "no, 
>>> unless Facebook runs some special client code to deliver (Squid) 
>>> certificate back to Facebook".
>>>
>>> In general, the origin server assumes that the client is talking to 
>>> it directly. Clients may pin or otherwise restrict certificates that 
>>> they trust, but after the connection is successfully established, the 
>>> server may assume that it is talking to the client directly. A 
>>> paranoid server may deliver special code to double check that 
>>> assumption, but there are other, more standard methods to prevent 
>>> bumping such as certificate pinning and certificate transparency cervices.
>>>
>>>
>>>
>>>> is the key/cert of FB to decrypt the https content is same on all browsers 
>>>> on all computers ?
>>>
>>> If you are asking whether the generated certificates are going to be 
>>> the same for all clients, then the answer is "yes, provided all those 
>>> 200 Squids use the same configuration (including the CA certificate) 
>>> and receive the same real certificate from Facebook". Squid's 
>>> certificate generation algorithm generates the same certificate given 
>>> the same configuration and the same origin server certificate.
>>>
>>>
>>> HTH,
>>>
>>> Alex.
>>> _______________________________________________
>>> squid-users mailing list
>>> squid-users@lists.squid-cache.org
>>> http://lists.squid-cache.org/listinfo/squid-users
>>>
>>
>> _______________________________________________
>> squid-users mailing list
>> squid-users@lists.squid-cache.org
>> http://lists.squid-cache.org/listinfo/squid-users
>>
> 


_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to