On Mon, 16 Dec 2013 22:18:46 +0100
Rainer Jung <rainer.j...@kippdata.de> wrote:

> On 16.12.2013 20:25, William A. Rowe Jr. wrote:
> > On Sat, 14 Dec 2013 10:25:00 +0100
> > Kaspar Brand <httpd-dev.2...@velox.ch> wrote:
> > 
> >> Just unload mod_proxy_http and mod_ssl
> >> from the configuration, and you'll find that forward proxying
> >> https:// requests continues to work perfectly, i.e. is completely
> >> unaffected by any code in these two modules (mod_proxy_connect is
> >> all it takes)
> > 
> > I'm just wondering two days later if I'm the only one struck by the
> > madness of insisting 'httpd can only do one thing at once', or
> > whether I'm one of many who were too taken aback to respond yet.
> > 
> > One thing httpd has done for years is 'walk and chew gum at the same
> > time', and done it well.
> > 
> > If you are actually arguing for retaining a defect on the basis
> > that it is acceptable to require the user drop modules used by
> > other hosts running in the same process, I'm pretty sure your
> > solution is not acceptable to the pmc of this project.
> > 
> > The user-agent must use an https CONNECT from the user agent to the
> > proxy server (using mod_ssl) lest the entire office/floor/it ops
> > center sniff that traffic off the wire.  Your solution is devoid of
> > any sense of logic or security.
> 
> "must" is a bit strong: AFAIK user agents will not use https to an
> https forward proxy, but instead http plus CONNECT. 

If auth is used, https from the user-agent to the proxy host, and 
https tunneled from the user-agent straight through to the target of
the CONNECT request, provided an https URL for the https protocol
proxy is configured.

> The proxy is a
> man in the middle but should nevertheless not be able to easily
> decrypt the ssl encryption set up between user agent and target
> server (via the packet forwarding proxy). 

Also my understanding.  https: proxy CONNECT would tunnel an entirely
distict ssl session end to end, with the proxy itself having very
little chance of decoding the conversation.

> The like no other sniffing
> system should be. What is noticeable though is the address/name and
> port of the system the user agent wants to connect to (the CONNECT
> data which is send unencrypted to the forward proxy).

Yes, the https target is revealed.  Proxy auth is revealed (often 
dangerously overlapping the user's credentials on other services).

> It seems Firefox does not yet support speaking https to the forward
> proxy (https://bugzilla.mozilla.org/show_bug.cgi?id=378637), and
> chrome seems to support it
> (http://www.chromium.org/developers/design-documents/secure-web-proxy).
> i haven't checked the current status in depth though.

Thanks for the data points, collecting a number of additional data
points in the morning.

> Finally: CONNECT over HTTPS wasn't working in our web server for a
> long time, see
> https://issues.apache.org/bugzilla/show_bug.cgi?id=29744.

I'd been aware of that.

Reply via email to