Hi, Amos
> What exactly are you trying to achieve with this?
I'm really sorry... It's a little bit difficult to explain...
The following is the more detail.
-----------------------
The Internet
---+------------
|
--------+-+-------------
|
+-----+-------+
| squid | (1)
| (tcp/8080) |
+-----+-------+
|.2
--------+-+---------------- 10.0.0.0/24
|.1
+--+--+
| R |
+--+--+
|.1
-------+--+---------------- 192.168.0.0/24
|.2
+----+--------+
| squid + |
| tproxy | (2)
| (tcp/8080) |
+----+--------+
|.2
-------+--+---------------- 192.168.1.0/24
|.3
+--+-----+
| client |
+--------+
- The demand
- The client must use proxy(2) using tcp/8080
- by browser settings
HTTP -> proxy(2) (192.168.1.2:8080)
HTTPS -> proxy(2) (192.168.1.2:8080)
- proxy(2) don't have to be "transparent"
- The proxy(2)'s parent proxy must be proxy(1)
using cache_peer
- Both proxy(1) and proxy(2) must record
"client original source address" in access log for security action
!!! It's most important !!!
I think that I have to use tproxy(not transparent)
to achieve above demands... what do you think ?
Sincerely,
-- Mikio Kishi On Thu, Apr 9, 2009 at 4:54 PM, Amos Jeffries <squid3_at_treenet.co.nz> wrote: > Mikio Kishi wrote: >> >> Hi, Amos >> >>> HTTPS encrypted traffic cannot be intercepted. >> >> Yes, I know that. but, in this case, not "transparent". >> >>> (1) (2) >>> >>> | | >>> +------+ | +------------+ | +---------+ >>> |WWW +---+ | | +----+ WWW | >>> |Client|.2 | .1| squid |.1 | .2| Server | >>> +------+ +-----+ + tproxy +----+ |(tcp/443)| >>> | | (tcp/8080) | | |(tcp/80) | >>> | +------------+ | +---------+ >>> 192.168.0.0/24 10.0.0.0/24 >>> >>> (1) 192.168.0.2 ------> 192.168.0.1:8080 >>> ^^^^^ >>> (2) 192.168.0.2 ------> 10.0.0.2:443 >>> ^^^ >> >> Just only thing I'd like to do is "source address spoofing" >> using tproxy. >> >> Does that make sense ? > > No. Squid is perfectly capable of making HTTPS links outbound without > tproxy. The far end only knows that some client connected. > > HTTPS cannot be spoofed, its part of the security involved with the SSL > layer. > > What exactly are you trying to achieve with this? > > Amos > -- > Please be using > Current Stable Squid 2.7.STABLE6 or 3.0.STABLE13 > Current Beta Squid 3.1.0.6 >Received on Sat Apr 11 2009 - 19:13:05 MDT
This archive was generated by hypermail 2.2.0 : Sun Apr 12 2009 - 12:00:03 MDT