Re: [squid-users] https issues for google

2014-12-10 Thread glenn.groves
Hi Eliezer,

The command for www.google.com failed to complete the connection with a unknown 
protocol error: 

openssl s_client -connect www.google.com:443 -showcerts
CONNECTED(0003)
140623996839752:error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown 
protocol:s23_clnt.c:766:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 263 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
---

The command for www.google.com.au, google.com.au AND google.com all got the 
certificate fine, for example a snipt:

openssl s_client -connect www.google.com.au:443 -showcerts
CONNECTED(0003)
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
verify return:1
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
verify return:1
depth=1 C = US, O = Google Inc, CN = Google Internet Authority G2
verify return:1
depth=0 C = US, ST = California, L = Mountain View, O = Google Inc, CN = 
google.com
verify return:1
---
Certificate chain
 0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=google.com
   i:/C=US/O=Google Inc/CN=Google Internet Authority G2

Server certificate
subject=/C=US/ST=California/L=Mountain View/O=Google Inc/CN=google.com
issuer=/C=US/O=Google Inc/CN=Google Internet Authority G2
---
No client certificate CA names sent
---
SSL handshake has read 10548 bytes and written 389 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1.2
Cipher: ECDHE-RSA-AES128-GCM-SHA256
Session-ID: 363AA9E6E5446296B11FC1763C24C0C23D6D4D67E4E0D858CEAA9C3B8172CE9A
Session-ID-ctx:
Master-Key: 
30AC2CE9E8447130F9A4664CEF9399075C5C97602F4908D532540CE3694558AF66D54A5390FAF137BB8121785D0B7BB3
Key-Arg   : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
TLS session ticket lifetime hint: 100800 (seconds)
TLS session ticket:
 - 58 90 ee 84 cd 6d 26 5f-13 10 64 4c df 9a 1d a2   Xm_..dL
0010 - 61 fe 82 ea b8 28 c2 51-6d f4 d9 ac 4c a1 45 be   a(.Qm...L.E.
0020 - b4 e0 d0 2e 83 3b 08 f4-e1 20 0f 8d 7a fa 77 9f   .;... ..z.w.
0030 - 0b 15 5c a3 6f 36 a7 79-4a 8f 70 af ee 81 0e 34   ..\.o6.yJ.p4
0040 - 78 a0 ba 22 84 62 56 7f-19 37 19 d3 66 bd 9a e2   x...bV..7..f...
0050 - 5b a4 47 29 3d 73 32 a8-f8 2a 29 29 b6 81 1f 9b   [.G)=s2..*))
0060 - 74 bb a9 9a 6f 3a 70 5d-31 7c 5b ba 6c 06 2c 59   t...o:p]1|[.l.,Y
0070 - 14 b9 c8 af d5 3e 05 15-48 52 2e c6 0e c6 31 15   ...HR1.
0080 - 26 2e a6 5f d7 e4 09 dd-24 f7 74 ac 5e bb 00 ea   .._$.t.^...
0090 - 39 d8 70 0e ba 87 99 fe-ff 9c 02 cd bf f2 d4 8b   9.p.
00a0 - 2a c2 90 b2   *...

Start Time: 1418082857
Timeout   : 300 (sec)
Verify return code: 0 (ok)




-Original Message-
From: Eliezer Croitoru [mailto:elie...@ngtech.co.il] 
Sent: Monday, 8 December 2014 1:21 PM
To: squid-users@lists.squid-cache.org
Cc: Glenn Groves
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

OK Glenn,

It's unclear on what side the SSL error is.
There are issues and the next step would be to try to run some openssl s_client 
test towards these hosts.
An example throw a proxy and directly can be found in the next link:
http://stackoverflow.com/questions/3220419/openssl-s-client-using-a-proxy

We will see together the results of the basic test of direct connection vs a 
tunneled connection from the proxy itself and understand better the issue.

Eliezer

On 12/08/2014 02:25 AM, glenn.gro...@bradnams.com.au wrote:
 --Iptables is enabled, I suspect this should not be a problem there as 
 some SSL sites work. -- We do not use IPV6, I have tried disabling 
 IPV6 in Centos and leaving as is, no difference there.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUhRkdAAoJENxnfXtQ8ZQUcgoIAIee9Ce5JCNYRt+zIZXdrtEE
OzHA9YO1xucI5/xEJlPXvV0x5O4g75HINOyE+K/KII+z/T92Lvfoa4rYmo4D7jxf
0fqjwfP9D3D2Xb58lhlhfdoXD69L36orVKROahCt/xVx5b+lOlQ2NJI3NXDG2GnX
UG7nJENWeKW+u2AY9934ydP223cd08q471tmXCZba6bUGCWdC3/IFS7w2XVwbTsU
ffiv7dZc1V4q45XgHpeGbqhUKZpFlyJ2zxpqYbW9y+OKpNgfGnn/4GqAheCqeDco
t+VE21aiJux0xy7uWVnNj7VVsn3cV3EUBei3UiHZ0AKCoGsRERCt8c2OOmJgcvM=
=5R6z
-END PGP SIGNATURE-
 
This message (including any attachments) is confidential and may be legally 
privileged. If you are not the intended recipient, you should not disclose, 
copy or use any part of it - please delete all copies immediately and notify 
the Bradnam Group Helpdesk at helpd...@bradnams.com.au 

Any information, statements or opinions contained in this message (including 
any attachments) are given by the author. They are not given on behalf of the 
Bradnam

Re: [squid-users] https issues for google

2014-12-10 Thread Eliezer Croitoru
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glen,

Since openssls_client is showing you this error I assume squid
received the same response.
We do need to verify why the connection is being hangs.
For now it seems like not 100% squid related issue.

Eliezer

On 12/09/2014 01:57 AM, glenn.gro...@bradnams.com.au wrote:
 Hi Eliezer,
 
 The command for www.google.com failed to complete the connection
 with a unknown protocol error:
 
 openssl s_client -connect www.google.com:443 -showcerts 
 CONNECTED(0003) 140623996839752:error:140770FC:SSL
 routines:SSL23_GET_SERVER_HELLO:unknown protocol:s23_clnt.c:766: 
 --- no peer certificate available --- No client certificate CA
 names sent --- SSL handshake has read 7 bytes and written 263
 bytes --- New, (NONE), Cipher is (NONE) Secure Renegotiation IS NOT
 supported Compression: NONE Expansion: NONE ---

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUiC8XAAoJENxnfXtQ8ZQUTsoH/39dKxH0hacCfys0J1zIy+wi
hsgWSsgGUAwAwKwa8uEp8XgAqIEACrpig9MUDXWAqaQYwuufu8HqP6bBUC4PG3mx
MGbXrbMc8gEs1+K1pxGEmwph9GruTJKxSlBavxWDcozj6x7x2N7SEXRHvcqoq9SE
rqZo16eO5vG3cOLa+rsAA/ouEDVHm55G/MC+647nrztQneW1iKFoDzdTqPKl40kF
9RQZwwbbP7cSCF8RZh5AfJwBNpPQKt0eUisJqcWp4w9Kx7Mz4j0Qk7dVQiQ9vTMD
rM8z+8SJfdUdWBnWdUU1Pl5qG0T2BUQHtnkM/lyz4OdRNQnGzXdlaY4KSpybKsA=
=tePH
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] https issues for google

2014-12-07 Thread glenn.groves
Hi All,

I have finally been able to spend time upgrading a server to a later squid 
version, I have tried 3.4.9.

I could not get authentication to work for this test, but proceeded to test 
without (also dismisses auth as the problem).

I am getting the following in the logs with secure sites now the squid is 3.4.9:

192.168.9.69 TCP_MISS/200 295 CONNECT www.google.com:443 - 
HIER_DIRECT/216.58.220.1
192.168.9.69 TCP_MISS/200 0 CONNECT www.google.com:443 - 
HIER_DIRECT/216.58.220.132

Upgrading to 3.4.9 on Centos as been a pain so far, no point in proceeding with 
the problem persisting. Can someone advise why I am getting TCP_MISS/200 when 
going to secure google sites?

Or more importantly, how to fix my squid 3.1 on centos 6.5 with this problem.

Thanks,

Glenn

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of glenn.gro...@bradnams.com.au
Sent: Thursday, 9 October 2014 9:04 AM
To: elie...@ngtech.co.il; squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

Hi Eliezer,

The DNS we are using is the ISP default for external, our internal domain DNS 
for internal. Nslookup works for all tests.

I would like to update to the latest stable, but I am concerned of breaking the 
current setup. It took a little work to get it working correctly particularity 
on the multiple authentication methods working with our domain and trust.

I support what has been said - to check the logs. This will likely take time as 
I cannot reproduce this issue on demand - and I think users are starting to not 
report the issue and just living with it (or it is not getting all the way to 
me at least). I will have to get lucky at some point on my computer and look 
into it then.

Could squid be getting mixed up when mulipule https requests are to the same 
address (e.g. https://google.com.au)?

Thanks,

Glenn 

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Eliezer Croitoru
Sent: Wednesday, 8 October 2014 7:39 AM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glenn,

Since you are not using intercept or tproxy the basic place to look at is the 
access.log.
You can see there if the proxy is trying for example to reach an IPV6 address 
(by mistake).

Also to make sure there is an issue you can use specific exception like the 
cacheadmin acl you are using to allow the cacheadmin access without 
authentication for the basic test.

Also you are indeed using the latest CentOS 6.5 squid but since the current 
stable version is 3.4.8 you should try to upgrade(to something else then 3.1) 
due to other issues.

The issue can be a network or dns related issue which was not detected until 
now.

Please first make sure that the access.log and cache.log files are clean for 
errors or issues.

What dns servers are you using?

Eliezer

On 10/07/2014 06:51 AM, glenn.gro...@bradnams.com.au wrote:
 Hi All,
 
 We have a weird issue where https sites apparently don't respond (get 
 message this page can't be displayed). This mainly affects google 
 websites and to a lesser affect youtube. It has been reported it may 
 have affected some banking sites but this is unconfirmed. We are 
 running centos 6.5 with up to date squid from the centos repositories.
 
 Here is the version of squid: yum list installed | grep squid 
 squid.x86_64 7:3.1.10-20.el6_5.3
 
 The https sites work fine if I put a direct hole in the firewall to 
 allow internet traffic directly out - but this is not a solution.
 
 Thanks, Glenn

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUNF1uAAoJENxnfXtQ8ZQUlfYH/i0o9MQDTt8g5aINRljVSMZc
btC8mcYn/JYn4WUPIoOc4/MhvuYg0JO6hXsSoPxjI1khMrq9fTV2c8eaLItWqYCf
hjioWPJs2hPwfw6WDi0I6kF0Is+hD/MGsJci7s+jg593lHnm+ZjoDIHj0aCpcdgy
u95961yZWXINbYsjTirFftnX5UC5MWbwZjaah6zW84RKZl/pa1vJM/tdgqiLdE5V
GDNhS01mbKPfin8oc/RQk4nYAK39vncSebvSHJwkvPJIKlb54Yti64j6qUfPsav3
uUvIVKSpxZjFFJoLtw1zjn1MwyynoHNGT1lP+HptsGkDoeGJ6YWU/IwB1sFKcVk=
=GKmE
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users
 
This message (including any attachments) is confidential and may be legally 
privileged. If you are not the intended recipient, you should not disclose, 
copy or use any part of it - please delete all copies immediately and notify 
the Bradnam Group Helpdesk at helpd...@bradnams.com.au 

Any information, statements or opinions contained in this message (including 
any attachments) are given by the author. They are not given on behalf of the 
Bradnam Group unless subsequently confirmed by an individual other than the 
author who is duly authorised to represent the Bradnam Group (or any of its 
subsidiary and associate companies).

All sent and received email from

Re: [squid-users] https issues for google

2014-12-07 Thread Amos Jeffries
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/12/2014 9:48 p.m., glenn.groves wrote:
 Hi All,
 
 I have finally been able to spend time upgrading a server to a
 later squid version, I have tried 3.4.9.
 
 I could not get authentication to work for this test, but proceeded
 to test without (also dismisses auth as the problem).
 
 I am getting the following in the logs with secure sites now the
 squid is 3.4.9:
 
 192.168.9.69 TCP_MISS/200 295 CONNECT www.google.com:443 -
 HIER_DIRECT/216.58.220.1 192.168.9.69 TCP_MISS/200 0 CONNECT
 www.google.com:443 - HIER_DIRECT/216.58.220.132
 
 Upgrading to 3.4.9 on Centos as been a pain so far, no point in
 proceeding with the problem persisting. Can someone advise why I am
 getting TCP_MISS/200 when going to secure google sites?
 

200 because the tunnel was setup successfully.

TCP_MISS because a connection being opened does not use an existing
cache object. Old Squid versions do not use the TCP_TUNNEL label.

The above appear to be successful tunnels setup through the proxy.


 Or more importantly, how to fix my squid 3.1 on centos 6.5 with
 this problem.
 

What browser(s) are showing the problem? and what does a tcpdump trace
of the packets content show happening?

A) It could be they are trying to use SPDY or HTTP/2 inside the
tunnel. CONNECT technically could be followed immediately with traffic
bytes even though the tunnel/Upgrade process was not confirmed
successful by the proxy. Squid does not support that behaviour until
version 3.4.5 (bug 3371) but browsers using SPDY and HTTP/2 rely on it.

You may be able to backport the bug fix
(http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13126.patch),
but this is one unlikely to be easy across so many versions. There
have been numerous tunneling code updates in between.


B) It could be happy-eyeballs algorithm being used by the browser.
Settign up a connection in advance and having it timeout in the proxy
before an attempt to actually use it is made. Although Squid should
append _TIMEOUT to the MISS tag in those cases its not certain if that
happens on tunnels.

Amos
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJUhB8iAAoJELJo5wb/XPRjfsIH/jFvpT7a/lHZfM8uaMxoUVu4
oGLoyjx6m1ZEg/W5Ta+TjlnfJjcyqfZdkHeIJzY9athcAWaxcT/By2sFEhuPqdtJ
hbps9UWbcae3Uu8sL71oABPnNvfH23HpU6q3PBrNRv82K8jrFjS56oEFwCQrKavP
pxfirbNk0MZg9/bLDAGnD05ItKAxo+uQ2xQU0AE/z6z3LE23WaMS4axTNLBS2icP
V9y2D90mH35nMlaFkhSPl1oL8HfQ1yOuKoNJz2YSgIsgiEmGBsF9aRQ+FS1CgiSh
HFFDyY+dAQUOFL9Qv/gJjddWhQAqH3X6kjqUCqgzqp+eHCOfrQGWzG6Wv42X7/k=
=P6Ev
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] https issues for google

2014-12-07 Thread glenn.groves
Hi All and Amos,

Thanks for correcting me on thinking that was an error.

Even though squid is logging TCP_200, the browser states the proxy server is 
not responding. This is again only with secure sites, mainly google sites. It 
is fairly reproducible now with google mail.

On IE, the error is :the proxy server is not responding
On Chrome: ERR_SSL_PROTOCOL_ERROR
On Firefox ssl_error_rx_record_too_long

If I bypass the proxy and go direct to the internet through our firewall, it 
works fine.

This suggests to me, without having any errors in squid to go by, that squid is 
doing something to the SSL record. What can I do to try and fix or diagnose? 

Thanks,

Glenn

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Amos Jeffries
Sent: Sunday, 7 December 2014 7:34 PM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/12/2014 9:48 p.m., glenn.groves wrote:
 Hi All,
 
 I have finally been able to spend time upgrading a server to a later 
 squid version, I have tried 3.4.9.
 
 I could not get authentication to work for this test, but proceeded to 
 test without (also dismisses auth as the problem).
 
 I am getting the following in the logs with secure sites now the squid 
 is 3.4.9:
 
 192.168.9.69 TCP_MISS/200 295 CONNECT www.google.com:443 -
 HIER_DIRECT/216.58.220.1 192.168.9.69 TCP_MISS/200 0 CONNECT
 www.google.com:443 - HIER_DIRECT/216.58.220.132
 
 Upgrading to 3.4.9 on Centos as been a pain so far, no point in 
 proceeding with the problem persisting. Can someone advise why I am 
 getting TCP_MISS/200 when going to secure google sites?
 

200 because the tunnel was setup successfully.

TCP_MISS because a connection being opened does not use an existing cache 
object. Old Squid versions do not use the TCP_TUNNEL label.

The above appear to be successful tunnels setup through the proxy.


 Or more importantly, how to fix my squid 3.1 on centos 6.5 with this 
 problem.
 

What browser(s) are showing the problem? and what does a tcpdump trace of the 
packets content show happening?

A) It could be they are trying to use SPDY or HTTP/2 inside the tunnel. CONNECT 
technically could be followed immediately with traffic bytes even though the 
tunnel/Upgrade process was not confirmed successful by the proxy. Squid does 
not support that behaviour until version 3.4.5 (bug 3371) but browsers using 
SPDY and HTTP/2 rely on it.

You may be able to backport the bug fix
(http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13126.patch),
but this is one unlikely to be easy across so many versions. There have been 
numerous tunneling code updates in between.


B) It could be happy-eyeballs algorithm being used by the browser.
Settign up a connection in advance and having it timeout in the proxy before an 
attempt to actually use it is made. Although Squid should append _TIMEOUT to 
the MISS tag in those cases its not certain if that happens on tunnels.

Amos
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJUhB8iAAoJELJo5wb/XPRjfsIH/jFvpT7a/lHZfM8uaMxoUVu4
oGLoyjx6m1ZEg/W5Ta+TjlnfJjcyqfZdkHeIJzY9athcAWaxcT/By2sFEhuPqdtJ
hbps9UWbcae3Uu8sL71oABPnNvfH23HpU6q3PBrNRv82K8jrFjS56oEFwCQrKavP
pxfirbNk0MZg9/bLDAGnD05ItKAxo+uQ2xQU0AE/z6z3LE23WaMS4axTNLBS2icP
V9y2D90mH35nMlaFkhSPl1oL8HfQ1yOuKoNJz2YSgIsgiEmGBsF9aRQ+FS1CgiSh
HFFDyY+dAQUOFL9Qv/gJjddWhQAqH3X6kjqUCqgzqp+eHCOfrQGWzG6Wv42X7/k=
=P6Ev
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users
 
This message (including any attachments) is confidential and may be legally 
privileged. If you are not the intended recipient, you should not disclose, 
copy or use any part of it - please delete all copies immediately and notify 
the Bradnam Group Helpdesk at helpd...@bradnams.com.au 

Any information, statements or opinions contained in this message (including 
any attachments) are given by the author. They are not given on behalf of the 
Bradnam Group unless subsequently confirmed by an individual other than the 
author who is duly authorised to represent the Bradnam Group (or any of its 
subsidiary and associate companies).

All sent and received email from/to the Bradnam Group (or any of its subsidiary 
and associate companies) is automatically scanned for the presence of computer 
viruses, security issues and inappropriate content.

For further information on the services which the Bradnam Group provides visit 
our web 
site(s) at www.bradnams.com.au or www.nationalglass.com.au
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] https issues for google

2014-12-07 Thread Eliezer Croitoru
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glenn,

I noticed that in the mean while you have upgraded the system to
latest 3.4.9 stable.
As Amos mentioned there are couple options about the tunneling issues.
I am unsure about the issue since in my environment squid seems to not
have any issues.
I would suggest a testing path for the issue before applying patches
blindly.
My suggestion is:
- - use one and only one client
- - run a tracepath from the client to the relevant sites.
- - test using wget\curl\script a tunnel request to
https:/www.gmail.com/ or https://mail.google.com/ throw the proxy from
the mentioned client.(there is a wget binary for windows)
- - if the issue accrues to this client try to remove the authentication
only for this client ip and try again.

The above test will isolate the issue from multiple clients and
unknown source to only one.
If you are familiar with PMTU or iptables clamping it will help to
test it more in depth.
I assume that you are using a Linux OS and I would prefer to get some
details about it as a starter.

Thanks,
Eliezer

On 10/09/2014 02:04 AM, glenn.gro...@bradnams.com.au wrote:
 Could squid be getting mixed up when mulipule https requests are to
 the same address (e.g. https://google.com.au)?
 
 Thanks,
 
 Glenn

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUhNWkAAoJENxnfXtQ8ZQUhjkIAIt13ZuSaMx7HyLYExUmAxPW
djzEj9DK6YBEUexeSA5hfIqRFwA0wRXK1a4fAni8J5v7iVqqdLj4Cwnx1C3Jf9Gc
fl9pRBbDNl8SMHWUPvxv0PELRgGzjGN76CXHB7aARbAKaOd6raajlbdl0ltro2D6
UyTaAjG2lc2yH/kJAGHsnjpEztkxWezdBWO3SC8Ej4bEdctfRfSEXeZDI0fQsSsg
D3vVG/ppGOSnivMfeQiaUSmexhaFI6XO0wrrj4uyeJ/ptVC0ZkikkCDCp3xRWEAt
BK0fgRJtUbc7jroqPx7ec+2l3gtZCbK8fMDwPMt2ut5IXevPFO8B4a16dPk40uM=
=6hKW
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] https issues for google

2014-12-07 Thread glenn.groves
Hi Eliezer,

Thanks for the response,

-- I am doing this on a clone of the original proxy with the issue, this frees 
me up to test, largely I am testing from one client - but try others every now 
and again to check, it is windows.
-- I am not sure as to the idea of the tracepath  from the client, it is a 
windows client so I did try mturoute, but it fails as it is trying to go 
direct, not through the proxy. If I enable direct in our firewall, the SSL 
sites work fine.
-- In the web browser I found if I go to secure google.com sites I get the 
errors, if I go to secure google.com.au site I do not.
-- I decided to do a tracepath from the proxy itself. Both google.com and 
google.com.au return the same output:
tracepath www.google.com.au
 1:  Proxy Ext IP (Proxy Ext IP)  0.059ms pmtu 1500
 1:  firewall gateway (firewall gateway)  0.513ms asymm  2
 1:  firewall gateway (firewall gateway)  0.384ms asymm  2
 2:  Internet IP (Internet IP)1.105ms
 3:  woo6.brisbane.telstra.net (165.228.143.1)   2.540ms
 4:  tengige0-8-0-2.woo-core1.brisbane.telstra.net (203.50.51.129)   4.136ms
 5:  bundle-ether11.chw-core10.sydney.telstra.net (203.50.11.70)  15.819ms
 6:  bundle-ether1.chw48.sydney.telstra.net (203.50.6.154)  23.194ms
 7:  no reply
 8:  no reply

-- I used wget and test this out:

https://www.google.com.au

wget -e https_proxy= proxyserver:port https://www.google.com.au
converted 'https://www.google.com.au' (ASCII) - 'https://www.google.com.au' 
(UTF-8)
--2014-12-08 09:58:18--  https://www.google.com.au/
Resolving proxyserver (proxyserver)... IP ADDRESS

Connecting to proxyserver(proxyserver)| IP ADDRESS |:port... connected.
ERROR: cannot verify www.google.com.au's certificate, issued by '/C=US/O=Google
Inc/CN=Google Internet Authority G2':
  Unable to locally verify the issuer's authority.
To connect to www.google.com.au insecurely, use `--no-check-certificate'.

https://www.google.com

wget -e https_proxy=proxyserver:port https://www.google.com
converted 'https://www.google.com' (ASCII) - 'https://www.google.com' (UTF-8)
--2014-12-08 09:55:29--  https://www.google.com/
Resolving proxyserver (proxyserver)... IP ADDRESS

Connecting to proxyserver (proxyserver)|IP ADDRESS|:PORT... connected.
Unable to establish SSL connection.

-- So this shows that SSL to google.com is a problem through the proxy, but 
google.com.au is not.

I am using linux, it is Centos 6.5, standard install, iptables, 2 interfaces - 
one for internal traffic to get out, the other on DMZ for the out traffic.

--Iptables is enabled, I suspect this should not be a problem there as some SSL 
sites work.
-- We do not use IPV6, I have tried disabling IPV6 in Centos and leaving as is, 
no difference there.


I do not have great experience in iptables of PMTU.


On a last note, I did wget on the proxy itself, I did not specify to go through 
squid so should have gone direct, the problem exists there too, seems squid may 
not be the issue but I would appreciate if I could have help on the issue:

#  wget https://www.google.com
--2014-12-08 10:14:39--  https://www.google.com/
Resolving www.google.com... 216.58.220.132, 2404:6800:4006:800::2004
Connecting to www.google.com|216.58.220.132|:443... connected.
OpenSSL: error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol
Unable to establish SSL connection.

#wget https://www.google.com.au
--2014-12-08 10:15:04--  https://www.google.com.au/
Resolving www.google.com.au... 216.58.220.131, 2404:6800:4006:800::2003
Connecting to www.google.com.au|216.58.220.131|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: âindex.htmlâ

[ =   

 ] 19,467  --.-K/s   in 0s

2014-12-08 10:15:04 (38.8 MB/s) - âindex.htmlâ



-Original Message-
From: Eliezer Croitoru [mailto:elie...@ngtech.co.il] 
Sent: Monday, 8 December 2014 8:33 AM
To: squid-users@lists.squid-cache.org
Cc: Glenn Groves
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glenn,

I noticed that in the mean while you have upgraded the system to latest 3.4.9 
stable.
As Amos mentioned there are couple options about the tunneling issues.
I am unsure about the issue since in my environment squid seems to not have any 
issues.
I would suggest a testing path for the issue before applying patches blindly.
My suggestion is:
- - use one and only one client
- - run a tracepath from the client to the relevant sites.
- - test using wget\curl\script a tunnel request to https:/www.gmail.com/ or 
https://mail.google.com/ throw the proxy from the mentioned client.(there is a 
wget binary for windows)
- - if the issue accrues to this client try to remove

Re: [squid-users] https issues for google

2014-12-07 Thread James Harper
 
 On IE, the error is :the proxy server is not responding
 On Chrome: ERR_SSL_PROTOCOL_ERROR
 On Firefox ssl_error_rx_record_too_long
 
 If I bypass the proxy and go direct to the internet through our firewall, it
 works fine.
 
 This suggests to me, without having any errors in squid to go by, that squid 
 is
 doing something to the SSL record. What can I do to try and fix or diagnose?
 

I've seen that when squid is returning a HTML page (error, denied, not found, 
etc). Seems strange that a 200 is being logged if that's the case though...

Can you do a tcpdump on the traffic and see what is happening, and if the 
response looks like SSL, or more like plaintext HTML?

James

___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] https issues for google

2014-10-09 Thread glenn.groves
I was able to capture the log at the time this happened to me, I got the 
following in the access.log:

1412895309.389 84 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895311.770  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895311.852 77 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895311.855  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895311.937 77 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895311.941  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.053107 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.056  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.124 65 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.680  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.765 79 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.768  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.846 74 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.851  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.927 73 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.931  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html

Not sure why it would be saying TCP_MISS, I assume the TCP_DENIED is expected 
as it happens after the TCP_MISS and has no authentication information.


-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of glenn.gro...@bradnams.com.au
Sent: Thursday, 9 October 2014 9:04 AM
To: elie...@ngtech.co.il; squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

Hi Eliezer,

The DNS we are using is the ISP default for external, our internal domain DNS 
for internal. Nslookup works for all tests.

I would like to update to the latest stable, but I am concerned of breaking the 
current setup. It took a little work to get it working correctly particularity 
on the multiple authentication methods working with our domain and trust.

I support what has been said - to check the logs. This will likely take time as 
I cannot reproduce this issue on demand - and I think users are starting to not 
report the issue and just living with it (or it is not getting all the way to 
me at least). I will have to get lucky at some point on my computer and look 
into it then.

Could squid be getting mixed up when mulipule https requests are to the same 
address (e.g. https://google.com.au)?

Thanks,

Glenn 

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Eliezer Croitoru
Sent: Wednesday, 8 October 2014 7:39 AM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glenn,

Since you are not using intercept or tproxy the basic place to look at is the 
access.log.
You can see there if the proxy is trying for example to reach an IPV6 address 
(by mistake).

Also to make sure there is an issue you can use specific exception like the 
cacheadmin acl you are using to allow the cacheadmin access without 
authentication for the basic test.

Also you are indeed using the latest CentOS 6.5 squid but since the current 
stable version is 3.4.8 you should try to upgrade(to something else then 3.1) 
due to other issues.

The issue can be a network or dns related issue which was not detected until 
now.

Please first make sure that the access.log and cache.log files are clean for 
errors or issues.

What dns servers are you using?

Eliezer

On 10/07/2014 06:51 AM, glenn.gro...@bradnams.com.au wrote:
 Hi All,
 
 We have a weird issue where https sites apparently don't respond (get 
 message this page can't be displayed). This mainly affects google 
 websites and to a lesser affect youtube. It has been reported it may 
 have affected some banking sites but this is unconfirmed. We are 
 running centos 6.5 with up to date squid from the centos repositories.
 
 Here is the version of squid: yum list installed | grep squid 
 squid.x86_64 7:3.1.10-20.el6_5.3
 
 The https sites work fine if I put a direct hole in the firewall to 
 allow internet traffic directly out - but this is not a solution.
 
 Thanks, Glenn

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUNF1uAAoJENxnfXtQ8ZQUlfYH/i0o9MQDTt8g5aINRljVSMZc

Re: [squid-users] https issues for google

2014-10-09 Thread Visolve Squid

Hi,

Check the below acl rule in your squid configuration file to Block the 
particular Domain URLs and also block keywords itself.


# ACL block sites
acl blocksites dstdomain  .youtube.com

# ACL block keywords
acl blockkeywords url_regex -i .youtube.com

#Deny access to block keywords ACLblock sites ACL's
http_access deny blockkeywords
http_access deny blocksites

And check the access.log file in the squid.

Regards,
ViSolve Squid
On 10/10/2014 4:32 AM, glenn.gro...@bradnams.com.au wrote:

I was able to capture the log at the time this happened to me, I got the 
following in the access.log:

1412895309.389 84 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895311.770  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895311.852 77 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895311.855  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895311.937 77 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895311.941  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.053107 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.056  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.124 65 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.680  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.765 79 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.768  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.846 74 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.851  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html
1412895312.927 73 10.10.10.69 TCP_MISS/200 0 CONNECT www.youtube.com:443 
MYADUSER DIRECT/74.125.237.160 -
1412895312.931  0 10.10.10.69 TCP_DENIED/407 3983 CONNECT 
www.youtube.com:443 - NONE/- text/html

Not sure why it would be saying TCP_MISS, I assume the TCP_DENIED is expected 
as it happens after the TCP_MISS and has no authentication information.


-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of glenn.gro...@bradnams.com.au
Sent: Thursday, 9 October 2014 9:04 AM
To: elie...@ngtech.co.il; squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

Hi Eliezer,

The DNS we are using is the ISP default for external, our internal domain DNS 
for internal. Nslookup works for all tests.

I would like to update to the latest stable, but I am concerned of breaking the 
current setup. It took a little work to get it working correctly particularity 
on the multiple authentication methods working with our domain and trust.

I support what has been said - to check the logs. This will likely take time as 
I cannot reproduce this issue on demand - and I think users are starting to not 
report the issue and just living with it (or it is not getting all the way to 
me at least). I will have to get lucky at some point on my computer and look 
into it then.

Could squid be getting mixed up when mulipule https requests are to the same 
address (e.g. https://google.com.au)?

Thanks,

Glenn

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Eliezer Croitoru
Sent: Wednesday, 8 October 2014 7:39 AM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glenn,

Since you are not using intercept or tproxy the basic place to look at is the 
access.log.
You can see there if the proxy is trying for example to reach an IPV6 address 
(by mistake).

Also to make sure there is an issue you can use specific exception like the 
cacheadmin acl you are using to allow the cacheadmin access without 
authentication for the basic test.

Also you are indeed using the latest CentOS 6.5 squid but since the current 
stable version is 3.4.8 you should try to upgrade(to something else then 3.1) 
due to other issues.

The issue can be a network or dns related issue which was not detected until 
now.

Please first make sure that the access.log and cache.log files are clean for 
errors or issues.

What dns servers are you using?

Eliezer

On 10/07/2014 06:51 AM, glenn.gro...@bradnams.com.au wrote:

Hi All,

We have a weird issue where https sites apparently don't respond (get
message this page can't be displayed). This mainly affects google
websites and to a lesser affect youtube. It has been reported it may
have affected some banking sites

Re: [squid-users] https issues for google

2014-10-08 Thread glenn.groves
Hi Eliezer,

The DNS we are using is the ISP default for external, our internal domain DNS 
for internal. Nslookup works for all tests.

I would like to update to the latest stable, but I am concerned of breaking the 
current setup. It took a little work to get it working correctly particularity 
on the multiple authentication methods working with our domain and trust.

I support what has been said - to check the logs. This will likely take time as 
I cannot reproduce this issue on demand - and I think users are starting to not 
report the issue and just living with it (or it is not getting all the way to 
me at least). I will have to get lucky at some point on my computer and look 
into it then.

Could squid be getting mixed up when mulipule https requests are to the same 
address (e.g. https://google.com.au)?

Thanks,

Glenn 

-Original Message-
From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On Behalf 
Of Eliezer Croitoru
Sent: Wednesday, 8 October 2014 7:39 AM
To: squid-users@lists.squid-cache.org
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey Glenn,

Since you are not using intercept or tproxy the basic place to look at is the 
access.log.
You can see there if the proxy is trying for example to reach an IPV6 address 
(by mistake).

Also to make sure there is an issue you can use specific exception like the 
cacheadmin acl you are using to allow the cacheadmin access without 
authentication for the basic test.

Also you are indeed using the latest CentOS 6.5 squid but since the current 
stable version is 3.4.8 you should try to upgrade(to something else then 3.1) 
due to other issues.

The issue can be a network or dns related issue which was not detected until 
now.

Please first make sure that the access.log and cache.log files are clean for 
errors or issues.

What dns servers are you using?

Eliezer

On 10/07/2014 06:51 AM, glenn.gro...@bradnams.com.au wrote:
 Hi All,
 
 We have a weird issue where https sites apparently don't respond (get 
 message this page can't be displayed). This mainly affects google 
 websites and to a lesser affect youtube. It has been reported it may 
 have affected some banking sites but this is unconfirmed. We are 
 running centos 6.5 with up to date squid from the centos repositories.
 
 Here is the version of squid: yum list installed | grep squid 
 squid.x86_64 7:3.1.10-20.el6_5.3
 
 The https sites work fine if I put a direct hole in the firewall to 
 allow internet traffic directly out - but this is not a solution.
 
 Thanks, Glenn

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUNF1uAAoJENxnfXtQ8ZQUlfYH/i0o9MQDTt8g5aINRljVSMZc
btC8mcYn/JYn4WUPIoOc4/MhvuYg0JO6hXsSoPxjI1khMrq9fTV2c8eaLItWqYCf
hjioWPJs2hPwfw6WDi0I6kF0Is+hD/MGsJci7s+jg593lHnm+ZjoDIHj0aCpcdgy
u95961yZWXINbYsjTirFftnX5UC5MWbwZjaah6zW84RKZl/pa1vJM/tdgqiLdE5V
GDNhS01mbKPfin8oc/RQk4nYAK39vncSebvSHJwkvPJIKlb54Yti64j6qUfPsav3
uUvIVKSpxZjFFJoLtw1zjn1MwyynoHNGT1lP+HptsGkDoeGJ6YWU/IwB1sFKcVk=
=GKmE
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users
 
This message (including any attachments) is confidential and may be legally 
privileged. If you are not the intended recipient, you should not disclose, 
copy or use any part of it - please delete all copies immediately and notify 
the Bradnam Group Helpdesk at helpd...@bradnams.com.au 

Any information, statements or opinions contained in this message (including 
any attachments) are given by the author. They are not given on behalf of the 
Bradnam Group unless subsequently confirmed by an individual other than the 
author who is duly authorised to represent the Bradnam Group (or any of its 
subsidiary and associate companies).

All sent and received email from/to the Bradnam Group (or any of its subsidiary 
and associate companies) is automatically scanned for the presence of computer 
viruses, security issues and inappropriate content.

For further information on the services which the Bradnam Group provides visit 
our web 
site(s) at www.bradnams.com.au or www.nationalglass.com.au
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users


Re: [squid-users] https issues for google

2014-10-07 Thread glenn.groves
Not sure about turning off the proxy authentication, this would be hard
to test as the issue is intermittent. The same with logging as I need to
capture the issue.

Thanks,

Glenn

-Original Message-
From: Victor Sudakov [mailto:suda...@sibptus.tomsk.ru] 
Sent: Tuesday, 7 October 2014 7:47 PM
To: Glenn Groves
Cc: squid-us...@squid-cache.org
Subject: Re: [squid-users] https issues for google

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

glenn.gro...@bradnams.com.au wrote:

 
 We have a weird issue where https sites apparently don't respond (get 
 message this page can't be displayed). This mainly affects google 
 websites and to a lesser affect youtube.

But if you switch off proxy authentication, https sites start working,
right?

- --
Victor Sudakov,  VAS4-RIPE, VAS47-RIPN
sip:suda...@sibptus.tomsk.ru
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUM7agAAoJEA2k8lmbXsY0SswIAKaYLybj92jJULi16lVfrZgm
hrizPJrpJAmLUwh5jtpQETGfc5owS9eyrwczh3dD1BZiLDQp2BUAMdlpG4bpmcFD
pLCQhjLZur63/DD/C3hWcch59wceAXFsJa4O2YKC9kFkijnJK+o5K/ixUl2Xbsoy
2VkHYpimXTvEJcRG6P3tpvkUmjl1IzrFtkUdmV7DmJVdacGOFeVu7UCPnXRD97K0
fdtLGH7tTw04PfBJIr985i+Tht+C6uqTQo4W1l41JRIGdSGOxTedYj4dIpvHh9YW
KtC4zxrDj+H4H9doOZwPo9sa3vY+HyT2oO2vHur1mPgt1RVmPsO+mo35h7CQj4I=
=ZAyn
-END PGP SIGNATURE-
___
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users