Re: [squid-users] logging to syslog

2015-11-11 Thread Sebastian Kirschner
Also its a bit Off-Topic,

I think it's a good idea that another user grep the information out of the 
access.log 
instead of let the access.log direct "write" in the syslog.

In my eyes its more secure.

Best Regards
Sebastian

___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] logging to syslog

2015-11-11 Thread Sebastian Kirschner
Hi Avraham,

1. Please do not contact me direct, use the Mailing List.

I read the sentences you wrote to me again,
do you really want that squid logs the things that would go in access.log to 
your /var/log/syslog (default debian path),
or do you just want to see what is written in the access.log.

For Changing the location/ way that squid log the access entries read 2. , if 
not the default
path of the access log is /usr/local/squid/var/logs/access.log. 

2. As you could see what Yuri Voinov wrote
> #  
>#udpTo send each log line as text data to a UDP receiver.
>#Place: The destination host name or IP and port.
>#Place Format:   //host:port
>#
>#tcpTo send each log line as text data to a TCP receiver.
>#Lines may be accumulated before sending (see buffered_logs).
>#Place: The destination host name or IP and port.
>#Place Format:   //host:port
>#
>#Default:
>#access_log daemon:/var/log/squid/access.log squid
>#Default:
># access_log daemon:/var/log/squid/access.log squid

These is snipped from the squid configuration documents on squid page 
(http://www.squid-cache.org/Doc/config/access_log/).

You could try ( I didn’t do it before) to use syslog as module and insert it in 
your squid.conf

Best Regards
Sebastian


Von: Avraham Serour [mailto:tovm...@gmail.com] 
Gesendet: Mittwoch, 11. November 2015 11:48
An: Sebastian Kirschner
Betreff: Re: [squid-users] logging to syslog

I'm actually using rsyslog, it comes with ubuntu
in any case my conf for now is:

template(name="lesquid_accessFormat" type="string" 
string="programname=%programname% %msg%\n")
action(type="omfile" dirCreateMode="0700" FileCreateMode="0644"
   File="/var/log/messages" template="lesquid_accessFormat")

then I tail the /var/log/messages file and check what happens when I make a 
request using the proxy

On Wed, Nov 11, 2015 at 12:09 PM, Avraham Serour  wrote:
so where should the symlink should be? what is the default unix socket path 
that squid tried to use?

On Wed, Nov 11, 2015 at 10:11 AM, Sebastian Kirschner 
 wrote:
Hi Avraham,

I think it wouldnt be a good idea to just create a symlink because squid (or 
the user under which squid runs) then must have access to the syslog,
and if your squid instance get compromised the the syslog is open to read for 
these one.

Best Regards
Sebastian
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] logging to syslog

2015-11-11 Thread Sebastian Kirschner
Hi Avraham,

I think it wouldnt be a good idea to just create a symlink because squid (or 
the user under which squid runs) then must have access to the syslog,
and if your squid instance get compromised the the syslog is open to read for 
these one.

Best Regards
Sebastian
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] SSL bumping without faked server certificates

2015-11-10 Thread Sebastian Kirschner
Hi Stefan,

I think it would be better to peek at step1 (Then you have the Client SNI) and 
at step2 you could bump or splice.
Your config 
> My assumption is that I have to use in Squid's config:
>https_port :3443 intercept ssl-bump cert= 
>key=
>acl MYSITE ssl:server_name .mydomain.com
>ssl_bump bump MYSITE
>ssl_bump splice all

A better way might be
# acl step1 at_step SslBump1
# acl MYSITE ssl:server_name .mydomain.com
#
# ssl_bump peek step1
# ssl_bump bump MYSITE
# ssl_bump splice all

Best Regards
Sebastian
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server certificates

2015-11-03 Thread Sebastian Kirschner
Hi,
regarding my missing programming skills it is hard for me to understand the 
code.

Regardless of that I have a suggestion that could be added to the code, hope it 
would work.
These should add a "variable" SNI , these should be "called" from 
cert_validate_message.h/.cc and appended as new line between host and 
proto_version to the external validator.

The code between the ** ** is my suggestions.


if (Ssl::TheConfig.ssl_crt_validator) {
Ssl::CertValidationRequest validationRequest;
// WARNING: Currently we do not use any locking for any of the
// members of the Ssl::CertValidationRequest class. In this code the
// Ssl::CertValidationRequest object used only to pass data to
// Ssl::CertValidationHelper::submit method.
validationRequest.ssl = ssl;
validationRequest.domainName = request->GetHost();
**  validationRequest.SNI = sniServer;  **



public:
SSL *ssl;
CertErrors *errors; ///< The list of errors detected
std::string domainName; ///< The server name
**  std::string SNI;///< The server name from SNI **
CertValidationRequest() : ssl(NULL), errors(NULL) {}
};



body.clear();
body += Ssl::CertValidationMsg::param_host + "=" + 
vcert.domainName;
STACK_OF(X509) *peerCerts = static_cast(SSL_get_ex_data(vcert.ssl, ssl_ex_index_ssl_cert_chain));

**  body += "\n" +  Ssl::CertValidationMsg::param_SNI + "=" + 
vcert.SNI **

if (const char *sslVersion = SSL_get_version(vcert.ssl))
body += "\n" +  
Ssl::CertValidationMsg::param_proto_version + "=" + sslVersion;


Best Regards
Sebastian

___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] squid: ERROR: Could not send signal 1 to process 4711: (1) Operation not permitted

2015-10-29 Thread Sebastian Kirschner
Dear Cheikhou,

1. Please don’t reply to me direct , answer to the list.

2. Could you post the owner, group and access rights of the .pid file (like 
with the command ls -l) ?  

Best Regards
Sebastian

-Ursprüngliche Nachricht-
Von: Cheikhou Dramé 
Gesendet: Donnerstag, 29. Oktober 2015 16:01
An: Sebastian Kirschner
Betreff: Re: [squid-users] squid: ERROR: Could not send signal 1 to process 
4711: (1) Operation not permitted

the file is /var/run/squid.pid
  i change the owner from root to squid user but i still have the error

On 29.10.2015 14:23, Sebastian Kirschner wrote:
> Hi Cheikhou,
>
> sounds like wrong access right for the .pid file, the default is 
> /usr/local/squid/var/run/${service_name}.pid , if you can't find it there 
> have a look in your squid.conf maybe you set it to another location.
>
> Maybe I´m wrong but your PID file should be accessible from user squid 
> because its running under squid.
>
>
> Best Regards
> Sebastian
> ___
> squid-users mailing list
> squid-users@lists.squid-cache.org
> http://lists.squid-cache.org/listinfo/squid-users

___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] squid: ERROR: Could not send signal 1 to process 4711: (1) Operation not permitted

2015-10-29 Thread Sebastian Kirschner
Hi Cheikhou,

sounds like wrong access right for the .pid file, the default is 
/usr/local/squid/var/run/${service_name}.pid , 
if you can't find it there have a look in your squid.conf maybe you set it to 
another location.

Maybe I´m wrong but your PID file should be accessible from user squid because 
its running under squid.


Best Regards
Sebastian
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server certificates

2015-10-27 Thread Sebastian Kirschner
Hi Amos,

> You may need to use key_extras feature for now to send the SNI logformat 
> value explicitly in a new key=value field.
Could you give me a hint where I find informations about that ? 
I searched in Wiki and google but only find a possibility to sending key_extras 
for auth_param,
also if it's possible how / where I could search for the "value" names like 
"sni-send-from-client".

> Or you could look at making a patch to send the SNI instead of HTTP level 
> "domain" from the CONNECT. Any help getting these annoyances out 
> of the way is very welcome.
Um , todo that I had to understand how it works at the moment and see the code. 
Could I find it on github ?

Best Regards
Sebastian
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server

2015-10-27 Thread Sebastian Kirschner
Hi Amos,

> You may need to use key_extras feature for now to send the SNI logformat 
> value explicitly in a new key=value field.
Could you give me a hint where I find informations about that ? 
I searched in Wiki and google but only find a possibility to sending key_extras 
for auth_param,
also if it's possible how / where I could search for the "value" names like 
"sni-send-from-client".

> Or you could look at making a patch to send the SNI instead of HTTP level 
> "domain" from the CONNECT. Any help getting these annoyances out 
> of the way is very welcome.
Um , todo that I had to understand how it works at the moment and see the code. 
Could I find it on github ?

Best Regards
Sebastian

___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server certificates

2015-10-26 Thread Sebastian Kirschner
e-host-certificates=on 
dynamic_cert_mem_cache_size=10MB 
cert=/usr/pbi/squid-amd64/local/etc/squid/serverkey.pem 
capath=/usr/pbi/squid-amd64/local/share/certs/

http_port 127.0.0.1:3128 intercept ssl-bump generate-host-certificates=on 
dynamic_cert_mem_cache_size=10MB 
cert=/usr/pbi/squid-amd64/local/etc/squid/serverkey.pem 
capath=/usr/pbi/squid-amd64/local/share/certs/

https_port 127.0.0.1:3129 intercept ssl-bump generate-host-certificates=on 
dynamic_cert_mem_cache_size=10MB 
cert=/usr/pbi/squid-amd64/local/etc/squid/serverkey.pem 
capath=/usr/pbi/squid-amd64/local/share/certs/

icp_port 0
pid_filename /var/run/squid/squid.pid
cache_effective_user proxy
cache_effective_group proxy
error_default_language de-de
icon_directory /usr/pbi/squid-amd64/local/etc/squid/icons
visible_hostname pfsense.onesty-tech.loc
cache_mgr ad...@pfsense-onesty.loc
access_log /var/squid/logs/access.log
cache_log /var/squid/logs/cache.log
netdb_filename /var/squid/logs/netdb.state
pinger_enable on
sslcrtd_program /usr/pbi/squid-amd64/local/libexec/squid/ssl_crtd -s 
/var/squid/lib/ssl_db -M 4MB -b 2048
sslcrtd_children 5
sslproxy_capath /usr/pbi/squid-amd64/local/share/certs/

logfile_rotate 7
debug_options rotate=7
shutdown_lifetime 3 seconds
# Allow local network(s) on interface(s)
acl localnet src  192.168.1.0/24
uri_whitespace strip


# Setup some default acls
# From 3.2 further configuration cleanups have been done to make things easier 
and safer. The manager, localhost, and to_localhost ACL definitions are now 
built-in.
# acl localhost src 127.0.0.1/32
acl allsrc src all
acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901  3128 3127 
1025-65535 
acl sslports port 443 563  

# From 3.2 further configuration cleanups have been done to make things easier 
and safer. The manager, localhost, and to_localhost ACL definitions are now 
built-in.
#acl manager proto cache_object

acl purge method PURGE
acl connect method CONNECT

# Define protocols used for redirects
acl HTTP proto HTTP
acl HTTPS proto HTTPS
acl allowed_subnets src 192.168.1.0/24
http_access allow manager localhost

http_access deny manager
http_access allow purge localhost
http_access deny purge
http_access deny !safeports
http_access deny CONNECT !sslports

# Always allow localhost connections
# From 3.2 further configuration cleanups have been done to make things easier 
and safer.
# The manager, localhost, and to_localhost ACL definitions are now built-in.
# http_access allow localhost

# Package Integration
url_rewrite_program /usr/pbi/squidguard-amd64/bin/squidGuard -c 
/usr/pbi/squidguard-amd64/etc/squidGuard/squidGuard.conf
url_rewrite_bypass off
url_rewrite_children 16 startup=8 idle=4 concurrency=0

# Custom options before auth
acl step1 at_step SslBump1
acl step2 at_step SslBump2
acl step3 at_step SslBump3

ssl_bump peek step1
ssl_bump bump all

sslcrtvalidator_program cache=8192 ttl=240 /tmpfs/main.sh
#sslcrtvalidator_children 12 startup=5 idle=1 concurrency=1

# Setup allowed acls
# Allow local network(s) on interface(s)
http_access allow allowed_subnets
http_access allow localnet
# Default block all to be sure
http_access deny allsrc

icap_enable on
icap_send_client_ip on
icap_send_client_username on
icap_client_username_encode off
icap_client_username_header X-Authenticated-User
icap_preview_enable on
icap_preview_size 1024

icap_service service_avi_req reqmod_precache icap://[::1]:1344/squid_clamav 
bypass=off
adaptation_access service_avi_req allow all
icap_service service_avi_resp respmod_precache icap://[::1]:1344/squid_clamav 
bypass=on
adaptation_access service_avi_resp allow all


Mit freundlichen Grüßen / Best Regards

Sebastian Kirschner
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server certificates

2015-10-22 Thread Sebastian Kirschner
Hi Amos ,

thanks for your reply.

Maybe we got an misunderstanding or I have an "false" opinion of the sentence I 
quoted before.

I thought you could say to me what for checks would definitely performed in 
"standard" installation with openssl,

not only that you believe that the X.509 certificate syntax and properties 
would be checked in correctness and the signer.

I´m sorry for these remark , but for me it's important to know what checks 
would performed to prevent another on the same thing and slow down the 
"process".


Another question regarding the Options from "sslcrtvalidator_program",
ttl " TTL in seconds for cached results. The default is 60 secs"

Is the cached results referred to the sslhost ?

For example , I configured that the TTL is 12 hours.
A request from Client A is performed to https://www.google.com the validator 
report back to squid that the certificate is ok and the connection would be 
spliced/bumped,
1 hour later Client B perform a request again too https://www.google.com , 
would squid use the "cached" answer from the validator used ?


And another question regarding the cache option.
What from the response would be cached , the complete one or maybe only the 
sslhost and response code ?

Would it be defined as byte in as the validator and speak ?
 

--
Message: 4
Date: Thu, 22 Oct 2015 22:41:43 +1300
From: Amos Jeffries 
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] Ssl-Bump and revoked server certificates
Message-ID: <5628af57.6060...@treenet.co.nz>
Content-Type: text/plain; charset=utf-8

On 22/10/2015 7:22 p.m., Sebastian Kirschner wrote:
> Hi,
> 
> I have a question regarding the SSL Server Certificate Validator.
> 
> In the Wiki is written:
> "The helper will be optionally consulted after an internal OpenSSL validation 
> we do now, regardless of that validation results."
> 
> What checks does the internal validation include ?

The "internal" validation is done by OpenSSL library. So whatever it is doing 
based on the configuration you give it.

I believe that includes X.509 certificate syntax validity, and X.509 properties 
validity in light of the TLS extensions negotiated on the connection, and a 
check the cert was signed by one of the system default Trusted-CA authorities 
(unless flags=NO_DEFAULT_CA was used) or a custom CA you loaded (with 
cafile=/capath= options).

There may be more (or less) happening but that is the bulk of it. And all 
inside OpenSSL so we can't easily debug the what/when/how of it when the output 
messages are obscure.

Amos
--
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


[squid-users] Rückruf: squid-users Digest, Vol 14, Issue 73

2015-10-22 Thread Sebastian Kirschner
Sebastian Kirschner möchte die Nachricht "squid-users Digest, Vol 14, Issue 73" 
zurückrufen.
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] squid-users Digest, Vol 14, Issue 73

2015-10-22 Thread Sebastian Kirschner
Hi Amos ,

thanks for your reply.

Maybe we got an misunderstanding or I have an "false" opinion of the sentence I 
quoted before.

I thought you could say to me what for checks would definitely performed in 
"standard" installation with openssl,

not only that you believe that the X.509 certificate syntax and properties 
would be checked in correctness and the signer.

I´m sorry for these remark , but for me it's important to know what checks 
would performed to prevent another on the same thing and slow down the 
"process".


Another question regarding the Options from "sslcrtvalidator_program",
ttl " TTL in seconds for cached results. The default is 60 secs"

Is the cached results referred to the sslhost ?

For example , I configured that the TTL is 12 hours.
A request from Client A is performed to https://www.google.com the validator 
report back to squid that the certificate is ok and the connection would be 
spliced/bumped,
1 hour later Client B perform a request again too https://www.google.com , 
would squid use the "cached" answer from the validator used ?


And another question regarding the cache option.
What from the response would be cached , the complete one or maybe only the 
sslhost and response code ?

Would it be defined as byte in as the validator and speak ?
 

--
Message: 4
Date: Thu, 22 Oct 2015 22:41:43 +1300
From: Amos Jeffries 
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] Ssl-Bump and revoked server certificates
Message-ID: <5628af57.6060...@treenet.co.nz>
Content-Type: text/plain; charset=utf-8

On 22/10/2015 7:22 p.m., Sebastian Kirschner wrote:
> Hi,
> 
> I have a question regarding the SSL Server Certificate Validator.
> 
> In the Wiki is written:
> "The helper will be optionally consulted after an internal OpenSSL validation 
> we do now, regardless of that validation results."
> 
> What checks does the internal validation include ?

The "internal" validation is done by OpenSSL library. So whatever it is doing 
based on the configuration you give it.

I believe that includes X.509 certificate syntax validity, and X.509 properties 
validity in light of the TLS extensions negotiated on the connection, and a 
check the cert was signed by one of the system default Trusted-CA authorities 
(unless flags=NO_DEFAULT_CA was used) or a custom CA you loaded (with 
cafile=/capath= options).

There may be more (or less) happening but that is the bulk of it. And all 
inside OpenSSL so we can't easily debug the what/when/how of it when the output 
messages are obscure.

Amos
--
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server certificates

2015-10-21 Thread Sebastian Kirschner
Hi,

I have a question regarding the SSL Server Certificate Validator.

In the Wiki is written:
"The helper will be optionally consulted after an internal OpenSSL validation 
we do now, regardless of that validation results."

What checks does the internal validation include ?

Couldn't find any information's about that.

Best Regards
Sebastian Kirschner
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Ssl-Bump and revoked server certificates

2015-10-14 Thread Sebastian Kirschner
Hi Walter,

do you have an update regarding your correct certificate validator ?

Mit freundlichen Grüßen / Best Regards

Sebastian Kirschner
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] Squid ignores crlfile options

2015-10-02 Thread Sebastian Kirschner
Thanks Amos for the reply ,

I will trim the config with your recommendations but a few questions exists on 
my side.

" If you mean it to be used to verify the *server* certificates then you need 
to configure sslproxy_crlfile instead."

I guess that was what im looking for :-) , 
but I couldn’t find something about that configuration directives on 
the squid doc configuration site and my squid ignores the options
because its unrecognized.

"> request_body_max_size 0 KB

Seriously? POST and PUT are forbidden to send data anywhere?"

Should the value be ignored because it’s a zero ?
Here the part of the Squid configuration document 
"If you set this parameter to a zero (the default), there will 
be no limit imposed."

" build-info requires a string. Whoever provided this package needs to fix 
that."
I was the builder :-) , could you give me a hint about that ?

Mit freundlichen Grüßen / Best Regards

Sebastian 

Message: 4
Date: Fri, 2 Oct 2015 02:51:56 +1300
From: Amos Jeffries 
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] Squid ignores crlfile options
Message-ID: <560d3a7c.2020...@treenet.co.nz>
Content-Type: text/plain; charset=utf-8

On 1/10/2015 11:54 p.m., Sebastian Kirschner wrote:
> Hi
> 
> I´m using squid (3.5.9) as transparent https proxy with build options (see 
> below) and config (see below , I removed some uninteresting things from the 
> config like caching).
> 
> To get the system more secure I would like to add crl checking (at the moment 
> static , later maybe dynamic if it's possible with my skills :-) ) and ocsp 
> (later) .
> I´m using the site https://revoked.grc.com/ to test my config.
> To do it I downloaded the certificate from the site , checked if a CRL URI is 
> available and downloaded the crl.
> Converted the format of the crl from DER to pem and inserted it my squid.conf 
>  "crlfile=/tmp/crl/glob.pem sslflags=VERIFY_CRL".
> 
> I tested the "crl.pem" with openssl and the site https://revoked.grc.com/  is 
> revoked in the crl.
> 
> But why squid seems to ignore the crlfile option / file ? 

Because it is only relevant on http(s)_port when there is TLS client 
certificate authentication being verified. You do not have that configured.


> Also I tested to use the crl in DER format but it still wouldn’t work , even 
> didn’t saw an error in the log when the file isn’t available.

It is not even loaded unless the clientca= is configured. Which turns on client 
cert authentication.


If you mean it to be used to verify the *server* certificates then you need to 
configure sslproxy_crlfile instead.


> #config
> http_port local.ip.adress:3128 ssl-bump generate-host-certificates=on 
> dynamic_cert_mem_cache_size=10MB 
> cert=/usr/pbi/squid-amd64/local/etc/squid/serverkey.pem 
> capath=/usr/pbi/squid-amd64/local/share/certs/ 
> crlfile=/tmp/crl/glob.pem sslflags=VERIFY_CRL
> 
> http_port 127.0.0.1:3128 intercept ssl-bump 
> generate-host-certificates=on dynamic_cert_mem_cache_size=10MB 
> cert=/usr/pbi/squid-amd64/local/etc/squid/serverkey.pem 
> capath=/usr/pbi/squid-amd64/local/share/certs/ 
> crlfile=/tmp/crl/glob.pem sslflags=VERIFY_CRL
> 
> https_port 127.0.0.1:3129 intercept ssl-bump 
> generate-host-certificates=on dynamic_cert_mem_cache_size=10MB 
> cert=/usr/pbi/squid-amd64/local/etc/squid/serverkey.pem 
> capath=/usr/pbi/squid-amd64/local/share/certs/ 
> crlfile=/tmp/crl/glob.pem sslflags=VERIFY_CRL
> 
> icp_port 0

This is a default, remove the icp_port line.

> dns_v4_first on
> pid_filename /var/run/squid/squid.pid

This is a default, remove the pid_filename line.

> cache_effective_user proxy
> cache_effective_group proxy

Check your build options (squid -v), your proxy is built to use the account 
'squid'. It is usually a good idea to stick with the


> error_default_language de-de
> icon_directory /usr/pbi/squid-amd64/local/etc/squid/icons
> visible_hostname pfsense

visible_hostname needs to be FQDN and publicly resolvable. It is the DNS 
hostname people use to access your proxy for thise icons you configured 
(amongst other things).

> cache_mgr ad...@pfsense-onesty.loc
> access_log /var/squid/logs/access.log
> cache_log /var/squid/logs/cache.log
> cache_store_log none

This is a default, remove the cache_store_log line.

> netdb_filename /var/squid/logs/netdb.state pinger_enable on 
> pinger_program /usr/pbi/squid-amd64/local/libexec/squid/pinger

This is probably a default too, if so remove the pinger lines. It will run 
unless disabled.

> sslcrtd_program /usr/pbi/squid-amd64/local/libexec/squid/ssl_crtd -s 
> /var/squid/lib/ssl_db -M 4MB -b 2048 sslcrtd_children 5
> 
> logfile_rotate 7
> debug_options rotate=7
> s

[squid-users] Squid ignores crlfile options

2015-10-01 Thread Sebastian Kirschner
Hi 

I´m using squid (3.5.9) as transparent https proxy with build options (see 
below) and config (see below , I removed some uninteresting things from the 
config like caching).

To get the system more secure I would like to add crl checking (at the moment 
static , later maybe dynamic if it's possible with my skills :-) ) and ocsp 
(later) .
I´m using the site https://revoked.grc.com/ to test my config.
To do it I downloaded the certificate from the site , checked if a CRL URI is 
available and downloaded the crl.
Converted the format of the crl from DER to pem and inserted it my squid.conf  
"crlfile=/tmp/crl/glob.pem sslflags=VERIFY_CRL".

I tested the "crl.pem" with openssl and the site https://revoked.grc.com/  is 
revoked in the crl.

But why squid seems to ignore the crlfile option / file ? 
Also I tested to use the crl in DER format but it still wouldn’t work , even 
didn’t saw an error in the log when the file isn’t available.


#logfile
2015/10/01 12:40:45.015 kid1| 83,3| client_side_request.cc(1684) doCallouts: 
Doing calloutContext->hostHeaderVerify()
2015/10/01 12:40:45.015 kid1| 83,3| client_side_request.cc(1691) doCallouts: 
Doing calloutContext->clientAccessCheck()
2015/10/01 12:40:45.017 kid1| 83,3| client_side_request.cc(1712) doCallouts: 
Doing calloutContext->clientRedirectStart()
2015/10/01 12:40:45.018 kid1| 83,3| client_side_request.cc(1720) doCallouts: 
Doing calloutContext->clientAccessCheck2()
2015/10/01 12:40:45.018 kid1| 83,3| client_side_request.cc(1739) doCallouts: 
Doing clientInterpretRequestHeaders()
2015/10/01 12:40:45.018 kid1| 83,3| client_side_request.cc(1748) doCallouts: 
Doing calloutContext->checkNoCache()
2015/10/01 12:40:45.018 kid1| 83,3| client_side_request.cc(1528) sslBumpNeed: 
sslBump required: peek
2015/10/01 12:40:45.018 kid1| 83,3| client_side_request.cc(1830) doCallouts: 
calling processRequest()
2015/10/01 12:40:45.025 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x80771c7b0 
104(6000, 0x7fffe51c)
2015/10/01 12:40:45.026 kid1| 83,5| client_side.cc(4267) 
clientPeekAndSpliceSSL: Start peek and splice on FD 10
2015/10/01 12:40:45.026 kid1| 83,5| bio.cc(118) read: FD 10 read 11 <= 11
2015/10/01 12:40:45.026 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 
11 bytes
2015/10/01 12:40:45.026 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 
bytes of TLS client Hello
2015/10/01 12:40:45.026 kid1| 83,2| client_side.cc(4270) 
clientPeekAndSpliceSSL: SSL_accept failed.

2015/10/01 12:40:45.040 kid1| 83,5| client_side.cc(4267) 
clientPeekAndSpliceSSL: Start peek and splice on FD 10
2015/10/01 12:40:45.040 kid1| 83,5| bio.cc(118) read: FD 10 read 11 <= 11
2015/10/01 12:40:45.040 kid1| 83,5| bio.cc(144) readAndBuffer: read 11 out of 
11 bytes
2015/10/01 12:40:45.040 kid1| 83,5| bio.cc(148) readAndBuffer: recorded 11 
bytes of TLS client Hello
2015/10/01 12:40:45.041 kid1| 83,2| client_side.cc(4270) 
clientPeekAndSpliceSSL: SSL_accept failed.
2015/10/01 12:40:45.041 kid1| 83,5| client_side.cc(4284) 
clientPeekAndSpliceSSL: I got hello. Start forwarding the request!!!
2015/10/01 12:40:45.220 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x8077e5eb0 
104(6001, 0x7fffe4bc)
2015/10/01 12:40:45.220 kid1| 83,5| bio.cc(95) write: FD 15 wrote 357 <= 357
2015/10/01 12:40:45.220 kid1| 83,5| bio.cc(118) read: FD 15 read -1 <= 7
2015/10/01 12:40:45.220 kid1| 83,5| bio.cc(123) read: error: 35 ignored: 1
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(118) read: FD 15 read 7 <= 7
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x8077e5eb0 
6(0, 0x8077e5f90)
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(118) read: FD 15 read 1453 <= 4368
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(118) read: FD 15 read -1 <= 2915
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(123) read: error: 35 ignored: 1
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(118) read: FD 15 read 1460 <= 2915
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(118) read: FD 15 read -1 <= 1455
2015/10/01 12:40:45.408 kid1| 83,5| bio.cc(123) read: error: 35 ignored: 1
2015/10/01 12:40:45.586 kid1| 83,5| bio.cc(118) read: FD 15 read 1455 <= 1455
2015/10/01 12:40:45.587 kid1| 83,5| support.cc(257) ssl_verify_cb: SSL 
Certificate signature OK: /C=US/OU=Domain Control Validated/CN=revoked.grc.com
2015/10/01 12:40:45.587 kid1| 83,5| support.cc(257) ssl_verify_cb: SSL 
Certificate signature OK: /C=US/OU=Domain Control Validated/CN=revoked.grc.com
2015/10/01 12:40:45.588 kid1| 83,5| support.cc(257) ssl_verify_cb: SSL 
Certificate signature OK: /C=US/OU=Domain Control Validated/CN=revoked.grc.com
2015/10/01 12:40:45.588 kid1| 83,4| support.cc(211) check_domain: Verifying 
server domain revoked.grc.com to certificate name/subjectAltName revoked.grc.com
2015/10/01 12:40:45.593 kid1| 83,5| bio.cc(95) write: FD 15 wrote 182 <= 182
2015/10/01 12:40:45.593 kid1| 83,5| bio.cc(576) squid_bio_ctrl: 0x8077e5eb0 
11(0, 0x0)
2015/10/01 12:40:45.593 kid1| 83,5| bio.cc(118) read: FD 15 read -1 <= 5
2015/10/01 12:40:45.593 kid1| 83,5| bio.cc(123) rea

Re: [squid-users] after changed from 3.4.13 to 3.5.8 sslbump doesn't work for the site https://banking.postbank.de/

2015-09-28 Thread Sebastian Kirschner
.15:443 remote=client.ip.adress:57125 flags=33
2015/09/28 14:25:28.966 kid1| 33,4| ServerBump.cc(44) ~ServerBump: destroying
2015/09/28 14:25:28.966 kid1| 33,4| ServerBump.cc(46) ~ServerBump: 
e:=sp2XDIV/0x804ba8180*1
2015/09/28 14:25:28.967 kid1| 93,5| AsyncJob.cc(40) ~AsyncJob: AsyncJob 
destructed, this=0x804b6e960 type=Http::Server [job6]
2015/09/28 14:25:28.967 kid1| 33,5| AsyncCallQueue.cc(57) fireNext: leaving 
ConnStateData::connStateClosed(FD -1, data=0x804b6e798)
2015/09/28 14:25:28.967 kid1| 5,4| AsyncCallQueue.cc(55) fireNext: entering 
comm_close_complete(FD 11)
2015/09/28 14:25:28.967 kid1| 5,4| AsyncCall.cc(38) make: make call 
comm_close_complete [call187]
2015/09/28 14:25:28.968 kid1| 51,3| fd.cc(93) fd_close: fd_close FD 11 client 
https start
2015/09/28 14:25:28.968 kid1| 5,5| ModPoll.cc(131) SetSelect: FD 11, type=1, 
handler=0, client_data=0x0, timeout=0
2015/09/28 14:25:28.968 kid1| 5,5| ModPoll.cc(131) SetSelect: FD 11, type=2, 
handler=0, client_data=0x0, timeout=0
2015/09/28 14:25:28.968 kid1| 5,5| AcceptLimiter.cc(55) kick: size=0
2015/09/28 14:25:28.968 kid1| 5,4| AsyncCallQueue.cc(57) fireNext: leaving 
comm_close_complete(FD 11)
2015/09/28 14:25:29.030 kid1| 5,5| ModPoll.cc(435) DoSelect: comm_poll: 1+0 FDs 
ready
2015/09/28 14:25:29.031 kid1| 5,3| Read.cc(144) HandleRead: FD 7, size 4095, 
retval 4095, errno 0
2015/09/28 14:25:29.031 kid1| 5,3| IoCallback.cc(116) finish: called for 
local=[::] remote=[::] FD 7 flags=1 (0, 0)
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCall.cc(93) ScheduleCall: 
IoCallback.cc(135) will call helperHandleRead(local=[::] remote=[::] FD 7 
flags=1, data=0x804bc2718, size=4095, buf=0x804c0b000) [call3]
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCallQueue.cc(55) fireNext: entering 
helperHandleRead(local=[::] remote=[::] FD 7 flags=1, data=0x804bc2718, 
size=4095, buf=0x804c0b000)
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCall.cc(38) make: make call 
helperHandleRead [call3]
2015/09/28 14:25:29.031 kid1| 84,5| helper.cc(866) helperHandleRead: 
helperHandleRead: 4095 bytes from ssl_crtd #Hlpr1
2015/09/28 14:25:29.031 kid1| 84,3| helper.cc(924) helperHandleRead: Grew read 
buffer to 8192
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall 
helperHandleRead constructed, this=0x8076eb600 [call188]
2015/09/28 14:25:29.031 kid1| 5,5| Read.cc(58) comm_read_base: comm_read, 
queueing read for local=[::] remote=[::] FD 7 flags=1; asynCall 0x8076eb600*1
2015/09/28 14:25:29.031 kid1| 5,5| ModPoll.cc(131) SetSelect: FD 7, type=1, 
handler=1, client_data=0x8068003c0, timeout=0
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCallQueue.cc(57) fireNext: leaving 
helperHandleRead(local=[::] remote=[::] FD 7 flags=1, data=0x804bc2718, 
size=4095, buf=0x804c0b000)
2015/09/28 14:25:29.031 kid1| 5,5| ModPoll.cc(435) DoSelect: comm_poll: 1+0 FDs 
ready
2015/09/28 14:25:29.031 kid1| 5,3| Read.cc(144) HandleRead: FD 7, size 4096, 
retval 1540, errno 0
2015/09/28 14:25:29.031 kid1| 5,3| IoCallback.cc(116) finish: called for 
local=[::] remote=[::] FD 7 flags=1 (0, 0)
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCall.cc(93) ScheduleCall: 
IoCallback.cc(135) will call helperHandleRead(local=[::] remote=[::] FD 7 
flags=1, data=0x804bc2718, size=1540, buf=0x804bfbfff) [call188]
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCallQueue.cc(55) fireNext: entering 
helperHandleRead(local=[::] remote=[::] FD 7 flags=1, data=0x804bc2718, 
size=1540, buf=0x804bfbfff)
2015/09/28 14:25:29.031 kid1| 5,4| AsyncCall.cc(38) make: make call 
helperHandleRead [call188]
2015/09/28 14:25:29.032 kid1| 84,5| helper.cc(866) helperHandleRead: 
helperHandleRead: 1540 bytes from ssl_crtd #Hlpr1
2015/09/28 14:25:29.032 kid1| 84,3| helper.cc(892) helperHandleRead: 
helperHandleRead: end of reply found
2015/09/28 14:25:29.032 kid1| 84,5| helper.cc(1167) GetFirstAvailable: 
GetFirstAvailable: Running servers 5
2015/09/28 14:25:29.032 kid1| 5,4| AsyncCall.cc(26) AsyncCall: The AsyncCall 
helperHandleRead constructed, this=0x804960080 [call189]
2015/09/28 14:25:29.032 kid1| 5,5| Read.cc(58) comm_read_base: comm_read, 
queueing read for local=[::] remote=[::] FD 7 flags=1; asynCall 0x804960080*1
2015/09/28 14:25:29.032 kid1| 5,5| ModPoll.cc(131) SetSelect: FD 7, type=1, 
handler=1, client_data=0x8068003c0, timeout=0
2015/09/28 14:25:29.032 kid1| 5,4| AsyncCallQueue.cc(57) fireNext: leaving 
helperHandleRead(local=[::] remote=[::] FD 7 flags=1, data=0x804bc2718, 
size=1540, buf=0x804bfbfff)

Mit freundlichen Grüßen / Best Regards

Sebastian Kirschner 
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] RE Peek and Splice error SSL_accept failed

2015-07-24 Thread Sebastian Kirschner
>Is that all sites or just a few special sites?

>James

I tested a few sites like google , youtube , sparkasse, sparklabs, all with the 
same issue.


Mit freundlichen Grüßen / Best Regards

Sebastian 
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


[squid-users] RE Peek and Splice error SSL_accept failed

2015-07-24 Thread Sebastian Kirschner
Hi ,

I minimized the configuration a little bit(you could see it at the bottom of 
these message).

Also I still try to understand why these error happen , I increased the Debug 
level and saw that squid tried 48 times to peek but failed.
At the end It says that it got an "Hello", does it mean that squid received 
after 48 tries the "Hello" ?

If yes why it does need so many tries ?

-> Part of debug log <-
2015/07/24 11:05:42.866 kid1| client_side.cc(4242) clientPeekAndSpliceSSL: 
Start peek and splice on FD 11
2015/07/24 11:05:42.866 kid1| bio.cc(120) read: FD 11 read 11 <= 11
2015/07/24 11:05:42.866 kid1| bio.cc(146) readAndBuffer: read 11 out of 11 bytes
2015/07/24 11:05:42.866 kid1| bio.cc(150) readAndBuffer: recorded 11 bytes of 
TLS client Hello
2015/07/24 11:05:42.866 kid1| ModEpoll.cc(116) SetSelect: FD 11, type=1, 
handler=1, client_data=0x7effbd078458, timeout=0
2015/07/24 11:05:42.866 kid1| client_side.cc(4245) clientPeekAndSpliceSSL: 
SSL_accept failed.
.
.
.
2015/07/24 11:05:42.874 kid1| client_side.cc(4242) clientPeekAndSpliceSSL: 
Start peek and splice on FD 11
2015/07/24 11:05:42.874 kid1| bio.cc(120) read: FD 11 read 6 <= 11
2015/07/24 11:05:42.874 kid1| bio.cc(146) readAndBuffer: read 6 out of 11 bytes
2015/07/24 11:05:42.874 kid1| bio.cc(150) readAndBuffer: recorded 6 bytes of 
TLS client Hello
2015/07/24 11:05:42.875 kid1| SBuf.cc(152) assign: SBuf2040 from c-string, n=0)
2015/07/24 11:05:42.875 kid1| SBuf.cc(152) assign: SBuf2038 from c-string, n=13)
2015/07/24 11:05:42.875 kid1| ModEpoll.cc(116) SetSelect: FD 11, type=1, 
handler=1, client_data=0x7effbd078458, timeout=0
2015/07/24 11:05:42.875 kid1| client_side.cc(4245) clientPeekAndSpliceSSL: 
SSL_accept failed.
2015/07/24 11:05:42.875 kid1| SBuf.cc(152) assign: SBuf2025 from c-string, 
n=4294967295)
2015/07/24 11:05:42.875 kid1| client_side.cc(4259) clientPeekAndSpliceSSL: I 
got hello. Start forwarding the request!!!

-> new configuration <-
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network

acl SSL_ports port 443
acl Safe_ports port 80  # http
acl Safe_ports port 21  # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70  # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535  # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT

http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost manager
http_access deny manager
http_access allow localnet
http_access allow localhost
http_access deny all

# Listening Ports
http_port 127.0.0.1:3120
http_port 192.168.1.104:3128 intercept
https_port 192.168.1.104:3129 intercept ssl-bump generate-host-certificates=on 
dynamic_cert_mem_cache_size=10MB cert=/etc/squid3/ssl_cert/myCA.pem

# some configuration options
cache_effective_user proxy
cache_effective_group proxy
access_log /var/squid/logs/access.log
cache_log /var/squid/logs/cache.log
pinger_enable on
pinger_program /lib/squid3/pinger
sslproxy_capath /etc/ssl/certs
sslcrtd_program /lib/squid3/ssl_crtd -s /var/squid/certs -M 4MB -b 2048

#ACLs
acl step1 at_step SslBump1
acl step2 at_step SslBump2
acl step3 at_step SslBump3
acl bypass ssl::server_name www.google.de

ssl_bump peek step1
ssl_bump splice bypass step2
ssl_bump bump all

# Debugging if needeed
debug_options all,6 6,0 16,0 18,0 19,0 20,0 32,0 47,0 79,0 90,0 92,0

# Leave coredumps in the first cache dir
coredump_dir /var/spool/squid3

#
# Add any of your own refresh_pattern entries above these.
#
refresh_pattern ^ftp:   144020% 10080
refresh_pattern ^gopher:14400%  1440
refresh_pattern -i (/cgi-bin/|\?) 0 0%  0
refresh_pattern .   0   20% 4320


Mit freundlichen Grüßen / Best Regards

Sebastian
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


[squid-users] Peek and Splice error SSL_accept failed

2015-07-16 Thread Sebastian Kirschner
Hi I´m using squid with version 3.5.6 in an debian test system.

I try to bypass some sites using the "ssl::server_name" acl , to do that I need 
to peek the connection first to decide if should be spliced or bumped.

But if I use peek at Step 1 , errors "client_side.cc(4245) 
clientPeekAndSpliceSSL: SSL_accept failed." errors appear in the cache.log

Squid was built with following options
./configure --build=x86_64-linux-gnu \
--prefix=/usr \
--includedir=${prefix}/include \
--mandir=${prefix}/share/man \
--infodir=${prefix}/share/info \
--sysconfdir=/etc \
--localstatedir=/var \
--libexecdir=${prefix}/lib/squid3 \
--srcdir=. \
--disable-maintainer-mode \
--disable-dependency-tracking \
--disable-silent-rules \
--datadir=/usr/share/squid3 \
--sysconfdir=/etc/squid3 \
--mandir=/usr/share/man \
--enable-inline \
--disable-arch-native \
--enable-async-io=8 \
--enable-storeio=ufs,aufs,diskd,rock \
--enable-removal-policies=lru,heap \
--enable-delay-pools \
--enable-cache-digests \
--enable-icap-client \
--enable-follow-x-forwarded-for \
--enable-auth-basic=DB,fake,getpwnam,LDAP,NCSA,NIS,PAM,POP3,RADIUS,SASL,SMB \
--enable-auth-digest=file,LDAP \
--enable-auth-negotiate=kerberos,wrapper \
--enable-auth-ntlm=fake,smb_lm \
--enable-external-acl-helpers=file_userip,kerberos_ldap_group,LDAP_group,session,SQL_session,unix_group,wbinfo_group
 \
--enable-url-rewrite-helpers=fake \
--enable-eui \
--enable-esi \
--enable-icmp \
--enable-zph-qos \
--enable-ecap \
--disable-translation \
--with-swapdir=/var/spool/squid3 \
--with-logdir=/var/squid/logs \
--with-pidfile=/var/run/squid3.pid \
--with-filedescriptors=65536 \
--with-large-files \
--with-default-user=proxy \
--with-openssl \
--with-open-ssl=/etc/ssl/openssl.cnf \
--enable-ssl-crtd \
--enable-linux-netfilter \
'CFLAGS=-g -O2 -fPIE -fstack-protector-strong -Wformat -Werror=format-security 
-Wall' \
'LDFLAGS=-fPIE -pie -Wl,-z,relro -Wl,-z,now' \
'CPPFLAGS=-D_FORTIFY_SOURCE=2' \
'CXXFLAGS=-g -O2 -fPIE -fstack-protector-strong -Wformat 
-Werror=format-security'

The squid.conf
http_port 192.168.1.104:3128 intercept
https_port 192.168.1.104:3129 intercept ssl-bump generate-host-certificates=on 
dynamic_cert_mem_cache_size=10MB cert=/etc/squid3/ssl_cert/myCA.pem
http_port 127.0.0.1:3120

icp_port 0
dns_v4_first on
pid_filename /var/run/squid/squid.pid
cache_effective_user proxy
cache_effective_group proxy
error_default_language de-de
visible_hostname pfsense
cache_mgr admin@test
access_log /var/squid/logs/access.log
cache_log /var/squid/logs/cache.log
cache_store_log none
netdb_filename /var/squid/logs/netdb.state
pinger_enable on
pinger_program /lib/squid3/pinger
sslproxy_capath /etc/ssl/certs
sslcrtd_program /lib/squid3/ssl_crtd -s /var/squid/certs -M 4MB -b 2048
sslproxy_cert_error allow all


logfile_rotate 7
debug_options rotate=7
shutdown_lifetime 3 seconds
# Allow local network(s) on interface(s)
acl localnet src  192.168.1.0/24
forwarded_for on
uri_whitespace strip

cache_mem 30 MB
maximum_object_size_in_memory 128 KB
memory_replacement_policy heap GDSF
cache_replacement_policy heap LFUDA
cache_dir ufs /var/squid/cache 100 16 256
minimum_object_size 0 KB
maximum_object_size 400 KB
offline_mode off
cache_swap_low 90
cache_swap_high 95
cache allow all

# Add any of your own refresh_pattern entries above these.
refresh_pattern ^ftp:   144020% 10080
refresh_pattern ^gopher:14400%  1440
refresh_pattern -i (/cgi-bin/|\?) 0 0%  0
refresh_pattern .   0   20% 4320

# Setup some default acls
# From 3.2 further configuration cleanups have been done to make things easier 
and safer. The manager, localhost, and to_localhost ACL definitions are now 
built-in.
# acl localhost src 127.0.0.1/32
acl allsrc src all
acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901  3128 3127 
1025-65535
acl sslports port 443 563

acl purge method PURGE
acl connect method CONNECT

# Define protocols used for redirects
acl HTTP proto HTTP
acl HTTPS proto HTTPS
acl allowed_subnets src 192.168.1.0/24
http_access allow manager localhost

http_access deny manager
http_access allow purge localhost
http_access deny purge
http_access deny !safeports
http_access deny CONNECT !sslports

request_body_max_size 0 KB
delay_pools 1
delay_class 1 2
delay_parameters 1 -1/-1 -1/-1
delay_initial_bucket_level 100
delay_access 1 allow allsrc

# Debugging if needeed
debug_options all,2 16,0 18,0 19,0 22,0 47,0 79,0

# Setup allowed acls
# Allow local network(s) on interface(s)
http_access allow allowed_subnets
http_access allow localnet
# Default block all to be sure
http_access deny allsrc

acl step1 at_step SslBump1
acl step3 at_step SslBump3
acl bypass ssl::server_name .sparkasse.de, .internet-filiale.net

ssl_bump peek step1
ssl_bump splice bypass
ssl_bump bump step3

always_direct allow all
ssl_bump bump all
ssl_bump server-first

Mit freundlichen Grüßen / Best Regards

Sebastian 
___
squid-users