[squid-users] Transparent proxy with HTTPS on freebsd

2009-04-28 Thread abdul sami
Dear all,

subject settings doesn't work when i set the transparent proxy though
http traffic works. on analysis of traffic i have come to know that
proxy doesn't add it's source address to https traffic rather simply
forwards it with local net address to gateway/firewall device which
ultimately drops the packets.

any suggestion in shape of steps/article would be highly appreciated.

Regards,


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread Amos Jeffries

abdul sami wrote:

Dear all,

subject settings doesn't work when i set the transparent proxy though
http traffic works. on analysis of traffic i have come to know that
proxy doesn't add it's source address to https traffic rather simply
forwards it with local net address to gateway/firewall device which
ultimately drops the packets.

any suggestion in shape of steps/article would be highly appreciated.

Regards,


Pardon?
 HTTPS being transparently intercepted (miracle #1) and the users not 
phoning you about being attacked? (miracle #2).


HTTPS == HTTP via _secure_ SSL.
transparent proxy == man-in-middle network attack on traffic.

HTTPS was created to prevent transparent interception amongst other 
things. So yes I'm not surprised it won't work.


What are you trying to achieve with this?

Amos
--
Please be using
  Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
  Current Beta Squid 3.1.0.7


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread goody goody

Dear Amos,

i say http works but https doesn't behind transparent proxy (no proxy details 
specified in browser) and this is simply I just want to achieve as some sites 
such as yahoo, gmail use https to connect to.

so if you guide my how can i configure squid to allow https sites to connect 
behind transparent proxy.

Further info regarding squid and bsd os is as follows.

squid version info

Squid Cache: Version 2.5.STABLE10
configure options:  --enable-storeio=diskd,ufs --enable-snmp 
--with-openssl=/opt/ssl '--enable-auth=basic ntlm' --enable-wccp 
'--enable-removal-policies=heap lru'

BSD OS Info

FreeBSD XXX 5.4-RELEASE FreeBSD 5.4-RELEASE #0: Fri Mar 30 18:16:33 PKT 2007
 r...@xxx.abc.com.:/usr/src/sys/i386/compile/BSD-ROUTER  i386

an early response would be very much appreciated.

Regards,


--- On Wed, 4/29/09, Amos Jeffries  wrote:

> From: Amos Jeffries 
> Subject: Re: [squid-users] Transparent proxy with HTTPS on freebsd
> To: "abdul sami" 
> Cc: squid-users@squid-cache.org
> Date: Wednesday, April 29, 2009, 1:49 PM
> abdul sami wrote:
> > Dear all,
> > 
> > subject settings doesn't work when i set the
> transparent proxy though
> > http traffic works. on analysis of traffic i have come
> to know that
> > proxy doesn't add it's source address to https traffic
> rather simply
> > forwards it with local net address to gateway/firewall
> device which
> > ultimately drops the packets.
> > 
> > any suggestion in shape of steps/article would be
> highly appreciated.
> > 
> > Regards,
> 
> Pardon?
>  HTTPS being transparently intercepted (miracle #1) and the
> users not phoning you about being attacked? (miracle #2).
> 
> HTTPS == HTTP via _secure_ SSL.
> transparent proxy == man-in-middle network attack on
> traffic.
> 
> HTTPS was created to prevent transparent interception
> amongst other things. So yes I'm not surprised it won't
> work.
> 
> What are you trying to achieve with this?
> 
> Amos
> -- Please be using
>   Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
>   Current Beta Squid 3.1.0.7
> 





Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread nyoman karna

nope,
you can NOT use transparent proxy for HTTPS.

since using transparent proxy for HTTPS
will be considered as man-in-the-middle attack.

you probably may use PAC (as Amos suggested)
but IMO it ruin the basic idea of using transparent proxy
(which is user does not need to put any setting in their browser)


Nyoman Bogi Aditya Karna
  IM Telkom
http://www.imtelkom.ac.id




--- On Wed, 4/29/09, goody goody  wrote:

> From: goody goody 
> Subject: Re: [squid-users] Transparent proxy with HTTPS on freebsd
> To: squid-users@squid-cache.org
> Cc: "Amos Jeffries" 
> Date: Wednesday, April 29, 2009, 7:30 AM
> 
> Dear Amos,
> 
> i say http works but https doesn't behind transparent proxy
> (no proxy details specified in browser) and this is simply I
> just want to achieve as some sites such as yahoo, gmail use
> https to connect to.
> 
> so if you guide my how can i configure squid to allow https
> sites to connect behind transparent proxy.
> 
> Further info regarding squid and bsd os is as follows.
> 
> squid version info
> 
> Squid Cache: Version 2.5.STABLE10
> configure options:  --enable-storeio=diskd,ufs
> --enable-snmp --with-openssl=/opt/ssl '--enable-auth=basic
> ntlm' --enable-wccp '--enable-removal-policies=heap lru'
> 
> BSD OS Info
> 
> FreeBSD XXX 5.4-RELEASE FreeBSD 5.4-RELEASE #0: Fri Mar 30
> 18:16:33 PKT 2007     r...@xxx.abc.com.:/usr/src/sys/i386/compile/BSD-ROUTER 
> i386
> 
> an early response would be very much appreciated.
> 
> Regards,
> 
> 
> --- On Wed, 4/29/09, Amos Jeffries 
> wrote:
> 
> > From: Amos Jeffries 
> > Subject: Re: [squid-users] Transparent proxy with
> HTTPS on freebsd
> > To: "abdul sami" 
> > Cc: squid-users@squid-cache.org
> > Date: Wednesday, April 29, 2009, 1:49 PM
> > abdul sami wrote:
> > > Dear all,
> > > 
> > > subject settings doesn't work when i set the
> > transparent proxy though
> > > http traffic works. on analysis of traffic i have
> come
> > to know that
> > > proxy doesn't add it's source address to https
> traffic
> > rather simply
> > > forwards it with local net address to
> gateway/firewall
> > device which
> > > ultimately drops the packets.
> > > 
> > > any suggestion in shape of steps/article would
> be
> > highly appreciated.
> > > 
> > > Regards,
> > 
> > Pardon?
> >  HTTPS being transparently intercepted (miracle
> #1) and the
> > users not phoning you about being attacked? (miracle
> #2).
> > 
> > HTTPS == HTTP via _secure_ SSL.
> > transparent proxy == man-in-middle network attack on
> > traffic.
> > 
> > HTTPS was created to prevent transparent interception
> > amongst other things. So yes I'm not surprised it
> won't
> > work.
> > 
> > What are you trying to achieve with this?
> > 
> > Amos
> > -- Please be using
> >   Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
> >   Current Beta Squid 3.1.0.7
> > 
> 
> 
> 
> 





Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread Stefan Hartmann
Goody,

if you simply want to have http and https go through the same unix box,
you can use squid for http and a port forwarding (for example using
iptables) for https.

Regards,
Stefan


nyoman karna wrote:
> nope,
> you can NOT use transparent proxy for HTTPS.
> 
> since using transparent proxy for HTTPS
> will be considered as man-in-the-middle attack.
> 
> you probably may use PAC (as Amos suggested)
> but IMO it ruin the basic idea of using transparent proxy
> (which is user does not need to put any setting in their browser)
> 
> 
> Nyoman Bogi Aditya Karna
>   IM Telkom
> http://www.imtelkom.ac.id
> 
> 
> 
> 
> --- On Wed, 4/29/09, goody goody  wrote:
> 
>> From: goody goody 
>> Subject: Re: [squid-users] Transparent proxy with HTTPS on freebsd
>> To: squid-users@squid-cache.org
>> Cc: "Amos Jeffries" 
>> Date: Wednesday, April 29, 2009, 7:30 AM
>>
>> Dear Amos,
>>
>> i say http works but https doesn't behind transparent proxy
>> (no proxy details specified in browser) and this is simply I
>> just want to achieve as some sites such as yahoo, gmail use
>> https to connect to.
>>
>> so if you guide my how can i configure squid to allow https
>> sites to connect behind transparent proxy.
>>
>> Further info regarding squid and bsd os is as follows.
>>
>> squid version info
>>
>> Squid Cache: Version 2.5.STABLE10
>> configure options:  --enable-storeio=diskd,ufs
>> --enable-snmp --with-openssl=/opt/ssl '--enable-auth=basic
>> ntlm' --enable-wccp '--enable-removal-policies=heap lru'
>>
>> BSD OS Info
>>
>> FreeBSD XXX 5.4-RELEASE FreeBSD 5.4-RELEASE #0: Fri Mar 30
>> 18:16:33 PKT 2007     r...@xxx.abc.com.:/usr/src/sys/i386/compile/BSD-ROUTER 
>> i386
>>
>> an early response would be very much appreciated.
>>
>> Regards,
>>
>>
>> --- On Wed, 4/29/09, Amos Jeffries 
>> wrote:
>>
>>> From: Amos Jeffries 
>>> Subject: Re: [squid-users] Transparent proxy with
>> HTTPS on freebsd
>>> To: "abdul sami" 
>>> Cc: squid-users@squid-cache.org
>>> Date: Wednesday, April 29, 2009, 1:49 PM
>>> abdul sami wrote:
>>>> Dear all,
>>>>
>>>> subject settings doesn't work when i set the
>>> transparent proxy though
>>>> http traffic works. on analysis of traffic i have
>> come
>>> to know that
>>>> proxy doesn't add it's source address to https
>> traffic
>>> rather simply
>>>> forwards it with local net address to
>> gateway/firewall
>>> device which
>>>> ultimately drops the packets.
>>>>
>>>> any suggestion in shape of steps/article would
>> be
>>> highly appreciated.
>>>> Regards,
>>> Pardon?
>>>   HTTPS being transparently intercepted (miracle
>> #1) and the
>>> users not phoning you about being attacked? (miracle
>> #2).
>>> HTTPS == HTTP via _secure_ SSL.
>>> transparent proxy == man-in-middle network attack on
>>> traffic.
>>>
>>> HTTPS was created to prevent transparent interception
>>> amongst other things. So yes I'm not surprised it
>> won't
>>> work.
>>>
>>> What are you trying to achieve with this?
>>>
>>> Amos
>>> -- Please be using
>>>   Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
>>>   Current Beta Squid 3.1.0.7
>>>
>>
>>
>>
> 
> 
>   
> 
> 

-- 
09-f9-11-02-9d-74-e3-5b-d8-41-56-c5-63-56-88-c0
---
OnlineDienst Nordbayern   | http://www.odn.de/| Internet-Systemhaus
GmbH & Co.KG  | E-Mail: ha...@odn.de  | Hosting, Housing
Steinstr. 19  | Tel: 0911 / 933877-0  | Consulting, VoIP
90419 Nuernberg - Germany | Fax: 0911 / 933877-55 | Programmierung
GF Christiane Teichgräber | AG Nürnberg HRA 13304 |



signature.asc
Description: OpenPGP digital signature


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread Amos Jeffries

nyoman karna wrote:

nope,
you can NOT use transparent proxy for HTTPS.

since using transparent proxy for HTTPS
will be considered as man-in-the-middle attack.

you probably may use PAC (as Amos suggested)
but IMO it ruin the basic idea of using transparent proxy
(which is user does not need to put any setting in their browser)


Not quite. WPAD can be used with PAC so users only have 'auto-detect' on 
their browsers. The rest happens 'transparently' in one meaning of the term.


Amos





--- On Wed, 4/29/09, goody goody  wrote:


From: goody goody 
Subject: Re: [squid-users] Transparent proxy with HTTPS on freebsd
To: squid-users@squid-cache.org
Cc: "Amos Jeffries" 
Date: Wednesday, April 29, 2009, 7:30 AM

Dear Amos,

i say http works but https doesn't behind transparent proxy
(no proxy details specified in browser) and this is simply I
just want to achieve as some sites such as yahoo, gmail use
https to connect to.

so if you guide my how can i configure squid to allow https
sites to connect behind transparent proxy.

Further info regarding squid and bsd os is as follows.

squid version info

Squid Cache: Version 2.5.STABLE10
configure options:  --enable-storeio=diskd,ufs
--enable-snmp --with-openssl=/opt/ssl '--enable-auth=basic
ntlm' --enable-wccp '--enable-removal-policies=heap lru'

BSD OS Info

FreeBSD XXX 5.4-RELEASE FreeBSD 5.4-RELEASE #0: Fri Mar 30
18:16:33 PKT 2007 r...@xxx.abc.com.:/usr/src/sys/i386/compile/BSD-ROUTER 
i386


an early response would be very much appreciated.

Regards,


--- On Wed, 4/29/09, Amos Jeffries 
wrote:


From: Amos Jeffries 
Subject: Re: [squid-users] Transparent proxy with

HTTPS on freebsd

To: "abdul sami" 
Cc: squid-users@squid-cache.org
Date: Wednesday, April 29, 2009, 1:49 PM
abdul sami wrote:

Dear all,

subject settings doesn't work when i set the

transparent proxy though

http traffic works. on analysis of traffic i have

come

to know that

proxy doesn't add it's source address to https

traffic

rather simply

forwards it with local net address to

gateway/firewall

device which

ultimately drops the packets.

any suggestion in shape of steps/article would

be

highly appreciated.

Regards,

Pardon?
  HTTPS being transparently intercepted (miracle

#1) and the

users not phoning you about being attacked? (miracle

#2).

HTTPS == HTTP via _secure_ SSL.
transparent proxy == man-in-middle network attack on
traffic.

HTTPS was created to prevent transparent interception
amongst other things. So yes I'm not surprised it

won't

work.

What are you trying to achieve with this?

Amos
-- Please be using
  Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
  Current Beta Squid 3.1.0.7








  



--
Please be using
  Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
  Current Beta Squid 3.1.0.7


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread abdul sami
First of all let me Thank you v much to all for replies.

i am searching/reading for PAC / port forwarding for squid on FreeBSD,
but it would be grateful to me if you provide me an example/source.

again i repeat i only want to allow https site like (gmail, yahoo)
behind my transparent proxy to work.

With Regards,
.Goody.
On Wed, Apr 29, 2009 at 7:03 PM, Stefan Hartmann  wrote:
> Goody,
>
> if you simply want to have http and https go through the same unix box,
> you can use squid for http and a port forwarding (for example using
> iptables) for https.
>
> Regards,
> Stefan
>
>
> nyoman karna wrote:
>> nope,
>> you can NOT use transparent proxy for HTTPS.
>>
>> since using transparent proxy for HTTPS
>> will be considered as man-in-the-middle attack.
>>
>> you probably may use PAC (as Amos suggested)
>> but IMO it ruin the basic idea of using transparent proxy
>> (which is user does not need to put any setting in their browser)
>>
>> 
>> Nyoman Bogi Aditya Karna
>>       IM Telkom
>> http://www.imtelkom.ac.id
>> --------
>>
>>
>>
>> --- On Wed, 4/29/09, goody goody  wrote:
>>
>>> From: goody goody 
>>> Subject: Re: [squid-users] Transparent proxy with HTTPS on freebsd
>>> To: squid-users@squid-cache.org
>>> Cc: "Amos Jeffries" 
>>> Date: Wednesday, April 29, 2009, 7:30 AM
>>>
>>> Dear Amos,
>>>
>>> i say http works but https doesn't behind transparent proxy
>>> (no proxy details specified in browser) and this is simply I
>>> just want to achieve as some sites such as yahoo, gmail use
>>> https to connect to.
>>>
>>> so if you guide my how can i configure squid to allow https
>>> sites to connect behind transparent proxy.
>>>
>>> Further info regarding squid and bsd os is as follows.
>>>
>>> squid version info
>>>
>>> Squid Cache: Version 2.5.STABLE10
>>> configure options:  --enable-storeio=diskd,ufs
>>> --enable-snmp --with-openssl=/opt/ssl '--enable-auth=basic
>>> ntlm' --enable-wccp '--enable-removal-policies=heap lru'
>>>
>>> BSD OS Info
>>>
>>> FreeBSD XXX 5.4-RELEASE FreeBSD 5.4-RELEASE #0: Fri Mar 30
>>> 18:16:33 PKT 2007     r...@xxx.abc.com.:/usr/src/sys/i386/compile/BSD-ROUTER
>>> i386
>>>
>>> an early response would be very much appreciated.
>>>
>>> Regards,
>>>
>>>
>>> --- On Wed, 4/29/09, Amos Jeffries 
>>> wrote:
>>>
>>>> From: Amos Jeffries 
>>>> Subject: Re: [squid-users] Transparent proxy with
>>> HTTPS on freebsd
>>>> To: "abdul sami" 
>>>> Cc: squid-users@squid-cache.org
>>>> Date: Wednesday, April 29, 2009, 1:49 PM
>>>> abdul sami wrote:
>>>>> Dear all,
>>>>>
>>>>> subject settings doesn't work when i set the
>>>> transparent proxy though
>>>>> http traffic works. on analysis of traffic i have
>>> come
>>>> to know that
>>>>> proxy doesn't add it's source address to https
>>> traffic
>>>> rather simply
>>>>> forwards it with local net address to
>>> gateway/firewall
>>>> device which
>>>>> ultimately drops the packets.
>>>>>
>>>>> any suggestion in shape of steps/article would
>>> be
>>>> highly appreciated.
>>>>> Regards,
>>>> Pardon?
>>>>   HTTPS being transparently intercepted (miracle
>>> #1) and the
>>>> users not phoning you about being attacked? (miracle
>>> #2).
>>>> HTTPS == HTTP via _secure_ SSL.
>>>> transparent proxy == man-in-middle network attack on
>>>> traffic.
>>>>
>>>> HTTPS was created to prevent transparent interception
>>>> amongst other things. So yes I'm not surprised it
>>> won't
>>>> work.
>>>>
>>>> What are you trying to achieve with this?
>>>>
>>>> Amos
>>>> -- Please be using
>>>>   Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
>>>>   Current Beta Squid 3.1.0.7
>>>>
>>>
>>>
>>>
>>
>>
>>
>>
>>
>
> --
> 09-f9-11-02-9d-74-e3-5b-d8-41-56-c5-63-56-88-c0
> ---
> OnlineDienst Nordbayern   | http://www.odn.de/    | Internet-Systemhaus
> GmbH & Co.KG              | E-Mail: ha...@odn.de  | Hosting, Housing
> Steinstr. 19              | Tel: 0911 / 933877-0  | Consulting, VoIP
> 90419 Nuernberg - Germany | Fax: 0911 / 933877-55 | Programmierung
> GF Christiane Teichgräber | AG Nürnberg HRA 13304 |
>
>


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-04-29 Thread Amos Jeffries
> First of all let me Thank you v much to all for replies.
>
> i am searching/reading for PAC / port forwarding for squid on FreeBSD,
> but it would be grateful to me if you provide me an example/source.

http://wiki.squid-cache.org/Technology/WPAD

>
> again i repeat i only want to allow https site like (gmail, yahoo)
> behind my transparent proxy to work.
>

Once the requests are going to Squid properly this is a simple matter of
ACLs.

Amos



Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-01 Thread abdul sami
Deal All,

So champs now the interesting part starts. ok

A few days ago we had proxy configured in the following way.

 DR Site
 \ int: bge0  int: bge1
internal netlan switch\Squid on
BSD-external firewallpublic net
  IP=X
\ IP=Y
  \

   Branches

1. Above diagram shows that our internal net & and DR site is
connected to squid on interface bge0 and uses transparent proxy
whereas branches come to bge1 and uses manual proxy to get access to
internet.

2. in above configuration http and https was working perfectly fine.

after that in our company major changes were made in network and in
result our proxy working scenario also changed as below.

DR site
   |
  int: bge0 | int: bge1
internal netlan switchSquid on
BSD|-external firewallpublic net
  IP=X
\ IP=Y
  \

   Branches

1. By network guys DR site traffic forcibly shifted to bge1, and
resultantly internet access at DR site stopped functioning.

2. my colleague who was previously looking proxy changed following
rule in ipfw file as below (as per his statement), and after that
internet access for http started working but https traffic stopped
working at both sides where transparent proxy was working i-e at DR
site and internal net, however https still work at branches.

RULE: ipfw add divert natd all from  any to any via bge1

CHANGED TO:

RULE: ipfw add divert natd all from internal net/24 to any via bge1

3. my network colleague told me that proxy is adding it's address as
source address to http packets but not to https, and passes https
packets with source address of internal net, which is ultimately
blocked at perimeter firewall.

now pls note that i have freshly started working on squid couple of
months has only passed.

so when https didn't run, i gone through documentation, forums etc
(one example is of your previous answers) and found that https would
not work on squid on transprent configuration & Got SURPRISED that how
it was working previously then. anyways now when i say this to my head
that squid on transparent proxy mode wont work for https he is not
ready to accept.

I argued with network colleagues that there must be some other
setttings had been done for https but the do not agree and say that we
had checked every thing and no such settings was there proxy was doing
all functionality,


Repeating Problem: Currently proxy adds it address as source to http
traffic but not https, in https case it simple forwards packets with
soruce address of internal net. and perimeter firewall allows proxy ip
traffic and drops internal net addresses, resultantly https does not
work.

So this is the whole story and i have got really stuck, what should i do.

.SUGGESTIONS DESPARITLY NEEDED.

With Regards,




On Thu, Apr 30, 2009 at 8:24 AM, Amos Jeffries  wrote:
>> First of all let me Thank you v much to all for replies.
>>
>> i am searching/reading for PAC / port forwarding for squid on FreeBSD,
>> but it would be grateful to me if you provide me an example/source.
>
> http://wiki.squid-cache.org/Technology/WPAD
>
>>
>> again i repeat i only want to allow https site like (gmail, yahoo)
>> behind my transparent proxy to work.
>>
>
> Once the requests are going to Squid properly this is a simple matter of
> ACLs.
>
> Amos
>
>


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-01 Thread abdul sami
Deal All,

So champs now the interesting part starts. ok

A few days ago we had proxy configured in the following way.

 DR Site
  \
   \ int: bge0  intt: bge1
internal net -> lan switch -> \Squid on BSD -> firewall -> public net
IP=X  \ IP=Y
  \
  Branches

1. Above diagram shows that our internal net & and DR site is
connected to squid on interface bge0 and uses transparent proxy
whereas branches come to bge1 and uses manual proxy to get access to
internet.

2. in above configuration http and https was working perfectly fine.

after that in our company major changes were made in network and in
result our proxy working scenario also changed as below.

DR site
   |
int: bge0   | int: bge1
internal net -> lan switch -> Squid on BSD| -> firewall ->  public net
   IP=X   \ IP=Y
  \
   Branches

1. By network guys DR site traffic forcibly shifted to bge1, and
resultantly internet access at DR site stopped functioning.

2. my colleague who was previously looking proxy changed following
rule in ipfw file as below (as per his statement), and after that
internet access for http started working but https traffic stopped
working at both sides where transparent proxy was working i-e at DR
site and internal net, however https still work at branches.

RULE: ipfw add divert natd all from  any to any via bge1

CHANGED TO:

RULE: ipfw add divert natd all from internal net/24 to any via bge1

3. my network colleague told me that proxy is adding it's address as
source address to http packets but not to https, and passes https
packets with source address of internal net, which is ultimately
blocked at perimeter firewall.

now pls note that i have freshly started working on squid couple of
months has only passed.

so when https didn't run, i gone through documentation, forums etc
(one example is of your previous answers) and found that https would
not work on squid on transprent configuration & Got SURPRISED that how
it was working previously then. anyways now when i say this to my head
that squid on transparent proxy mode wont work for https he is not
ready to accept.

I argued with network colleagues that there must be some other
setttings had been done for https but the do not agree and say that we
had checked every thing and no such settings was there proxy was doing
all functionality,


Repeating Problem: Currently proxy adds it address as source to http
traffic but not https, in https case it simple forwards packets with
soruce address of internal net. and perimeter firewall allows proxy ip
traffic and drops internal net addresses, resultantly https does not
work.

So this is the whole story and i have got really stuck, what should i do.

.SUGGESTIONS DESPARITLY NEEDED.

With Regards,

>
>
>
>
> On Thu, Apr 30, 2009 at 8:24 AM, Amos Jeffries  wrote:
>>> First of all let me Thank you v much to all for replies.
>>>
>>> i am searching/reading for PAC / port forwarding for squid on FreeBSD,
>>> but it would be grateful to me if you provide me an example/source.
>>
>> http://wiki.squid-cache.org/Technology/WPAD
>>
>>>
>>> again i repeat i only want to allow https site like (gmail, yahoo)
>>> behind my transparent proxy to work.
>>>
>>
>> Once the requests are going to Squid properly this is a simple matter of
>> ACLs.
>>
>> Amos
>>
>>
>


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-01 Thread Amos Jeffries
> Deal All,
>
> So champs now the interesting part starts. ok
>
> A few days ago we had proxy configured in the following way.
>
>  DR Site
>  \ int: bge0  int:
> bge1
> internal netlan switch\Squid on
> BSD-external firewallpublic net
>   IP=X
> \ IP=Y
>   \
>
>Branches
>
> 1. Above diagram shows that our internal net & and DR site is
> connected to squid on interface bge0 and uses transparent proxy
> whereas branches come to bge1 and uses manual proxy to get access to
> internet.
>
> 2. in above configuration http and https was working perfectly fine.
>
> after that in our company major changes were made in network and in
> result our proxy working scenario also changed as below.
>
> DR
> site
>|
>   int: bge0 | int:
> bge1
> internal netlan switchSquid on
> BSD|-external firewallpublic net
>   IP=X
> \ IP=Y
>   \
>
>Branches
>
> 1. By network guys DR site traffic forcibly shifted to bge1, and
> resultantly internet access at DR site stopped functioning.
>
> 2. my colleague who was previously looking proxy changed following
> rule in ipfw file as below (as per his statement), and after that
> internet access for http started working but https traffic stopped
> working at both sides where transparent proxy was working i-e at DR
> site and internal net, however https still work at branches.
>
> RULE: ipfw add divert natd all from  any to any via bge1
>
> CHANGED TO:
>
> RULE: ipfw add divert natd all from internal net/24 to any via bge1
>
> 3. my network colleague told me that proxy is adding it's address as
> source address to http packets but not to https, and passes https
> packets with source address of internal net, which is ultimately
> blocked at perimeter firewall.
>
> now pls note that i have freshly started working on squid couple of
> months has only passed.
>
> so when https didn't run, i gone through documentation, forums etc
> (one example is of your previous answers) and found that https would
> not work on squid on transprent configuration & Got SURPRISED that how
> it was working previously then. anyways now when i say this to my head
> that squid on transparent proxy mode wont work for https he is not
> ready to accept.
>
> I argued with network colleagues that there must be some other
> setttings had been done for https but the do not agree and say that we
> had checked every thing and no such settings was there proxy was doing
> all functionality,
>
>
> Repeating Problem: Currently proxy adds it address as source to http
> traffic but not https, in https case it simple forwards packets with
> soruce address of internal net. and perimeter firewall allows proxy ip
> traffic and drops internal net addresses, resultantly https does not
> work.
>
> So this is the whole story and i have got really stuck, what should i
> do.


Please note:
 HTTPS forwarding sounds like it is being done by the OS routing on the
proxy box. Not by the proxy software itself.

 Also using the WPAD solution I already proposed will make the clients go
through the proxy software. With same effects and controls as HTTP
traffic.

The other proper solution is for the main firewall to be updated to allow
the appropriate internal IPs to use HTTPS port 443 outbound.

One hack, which itself will break eventually and meanwhile has hole of its
own ... is to configure the proxy box firewall with those same IPs which
should be allowed HTTPS and source-NAT them to the proxy Box IP. Be
careful you only allow the acceptable IPs through this NAT though.


Amos



Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-04 Thread Matus UHLAR - fantomas
On 29.04.09 04:58, nyoman karna wrote:
> you can NOT use transparent proxy for HTTPS.
> 
> since using transparent proxy for HTTPS
> will be considered as man-in-the-middle attack.
> 
> you probably may use PAC (as Amos suggested)
> but IMO it ruin the basic idea of using transparent proxy
> (which is user does not need to put any setting in their browser)

the whole idea of intercepting proxy (also called transparent) is sick.
WPAD is way to go - browser will autodetect the proxy, so user can log there
and all problems caused by intercepting connections will be gone.
-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Micro$oft random number generator: 0, 0, 0, 4.33e+67, 0, 0, 0...


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-04 Thread Gavin McCullagh
Hi,

On Mon, 04 May 2009, Matus UHLAR - fantomas wrote:

> On 29.04.09 04:58, nyoman karna wrote:

> > you probably may use PAC (as Amos suggested)
> > but IMO it ruin the basic idea of using transparent proxy
> > (which is user does not need to put any setting in their browser)
> 
> the whole idea of intercepting proxy (also called transparent) is sick.

Would you care to substantiate that in a bit more detail?

> WPAD is way to go - browser will autodetect the proxy, so user can log there
> and all problems caused by intercepting connections will be gone.

I've been down this road.  We (a 3rd level college) have hundreds of users
walking on and off a campus with their laptops, mobile phones, netbooks,
pdas, etc.  We used to have posters, docs, everything set up to tell people
how to use the proxy.  We had a proxy.pac.  The support load was massive.
The number of people coming into our office for help setting it up was
huge.  The number of applications that use HTTP but don't support proxy.pac
files is surprisingly large.  The users leave the campus and have to undo
it the proxy settings, then redo them when next on campus.

It was imperative for us to be able to give completely transparent web
access.  It's also a big requirement to have caching to reduce our
bandwidth and give us some kind of logging.  So we have transparent
proxying of http traffic and we simply allow https traffic out.

This policy has been hugely successful.  You might argue that we should
just allow all http and https traffic out but that is more expensive,
slower and harder for us to keep track of (I'm not that keen on logging but
it's necessary for a host of reasons).

As it is now, the web just works for everyone.  People are far happier and
so are we.

Gavin



Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-04 Thread Jeff Sadowski
On Mon, May 4, 2009 at 3:35 PM, Gavin McCullagh  wrote:
> Hi,
>
> On Mon, 04 May 2009, Matus UHLAR - fantomas wrote:
>
>> On 29.04.09 04:58, nyoman karna wrote:
>
>> > you probably may use PAC (as Amos suggested)
>> > but IMO it ruin the basic idea of using transparent proxy
>> > (which is user does not need to put any setting in their browser)
>>
>> the whole idea of intercepting proxy (also called transparent) is sick.
>
> Would you care to substantiate that in a bit more detail?
>

If your blocking content that would violate rights, maybe; if you are
doing it to speed things up or blocking sites that have no place in
the current facility I can not see how it can be claimed as sick.
I think blocking most porn from schools and work is right. Maybe even
blocking youtube from work because of how much time is waisted.

>> WPAD is way to go - browser will autodetect the proxy, so user can log there
>> and all problems caused by intercepting connections will be gone.
>
> I've been down this road.  We (a 3rd level college) have hundreds of users
> walking on and off a campus with their laptops, mobile phones, netbooks,
> pdas, etc.  We used to have posters, docs, everything set up to tell people
> how to use the proxy.  We had a proxy.pac.  The support load was massive.
> The number of people coming into our office for help setting it up was
> huge.  The number of applications that use HTTP but don't support proxy.pac
> files is surprisingly large.  The users leave the campus and have to undo
> it the proxy settings, then redo them when next on campus.
>
> It was imperative for us to be able to give completely transparent web
> access.  It's also a big requirement to have caching to reduce our
> bandwidth and give us some kind of logging.  So we have transparent
> proxying of http traffic and we simply allow https traffic out.
>
> This policy has been hugely successful.  You might argue that we should
> just allow all http and https traffic out but that is more expensive,
> slower and harder for us to keep track of (I'm not that keen on logging but
> it's necessary for a host of reasons).
>
> As it is now, the web just works for everyone.  People are far happier and
> so are we.
>
> Gavin
>
>


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-04 Thread Gavin McCullagh
Hi Jeff,

On Mon, 04 May 2009, Jeff Sadowski wrote:

> On Mon, May 4, 2009 at 3:35 PM, Gavin McCullagh  
> wrote:
> >> the whole idea of intercepting proxy (also called transparent) is sick.
> >
> > Would you care to substantiate that in a bit more detail?
> 
> If your blocking content that would violate rights, maybe; if you are
> doing it to speed things up or blocking sites that have no place in
> the current facility I can not see how it can be claimed as sick.
> I think blocking most porn from schools and work is right. Maybe even
> blocking youtube from work because of how much time is waisted.

I think this misses the issue.  A web proxy is indeed a convenient way to
apply these sorts of blocks.  However, whether you force people to
configure proxies in order to get web access or you do it transparently
doesn't change the blocking.

Currently we have a very short list of blocked sites based mostly on file
sharing.  Personally, I'd like to remove that as I don't consider it
useful.  In certain labs (ie where the students use our computers) at
certain busy times of the year we occasionally block "time-waster" sites in
order to free up those computers for students doing assignments.  Those who
use their own laptops on wifi don't experience that.

Our students are adults.  We don't generally block based on content.  In
Ireland (where we are), primary and secondary schools are all given a
government-sponsored central broadband connection which is content filtered
transparently.  It's not squid, but it's the same principal.  Personally, I
don't really like the idea, but being pragmatic, I understand why they did
it.  Prior to filtering, a large number of teachers were dead set against
giving web access to students (we had bought our own connection).  Now that
they have a comfort blanket of state-sponsored content filtering, they're
fine with students using it.  Sadly, sites like youtube are blocked due to
unsuitable content, which is really a shame as there is lots of very useful
content.

We recently started using HAVP to block viruses/malware, but I think most
people would agree that that's in the student's interest.

Transparent proxying (as opposed to wpad) doesn't make any of this blocking
easier, though I guess perhaps it makes it less apparent.  However, it
makes net access far more convenient (as against wpad) for the user.

Gavin



Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-06 Thread Matus UHLAR - fantomas
> > On 29.04.09 04:58, nyoman karna wrote:
> > > you probably may use PAC (as Amos suggested)
> > > but IMO it ruin the basic idea of using transparent proxy
> > > (which is user does not need to put any setting in their browser)

> On Mon, 04 May 2009, Matus UHLAR - fantomas wrote:
> > the whole idea of intercepting proxy (also called transparent) is sick.

On 04.05.09 22:35, Gavin McCullagh wrote:
> Would you care to substantiate that in a bit more detail?

Making clients think they connect to the destination server when they do
not, breaks many things. It disables authentication, causes some TCP
problems (pmtu discovery?)...

> > WPAD is way to go - browser will autodetect the proxy, so user can log there
> > and all problems caused by intercepting connections will be gone.
> 
> I've been down this road.  We (a 3rd level college) have hundreds of users
> walking on and off a campus with their laptops, mobile phones, netbooks,
> pdas, etc.  We used to have posters, docs, everything set up to tell people
> how to use the proxy.  We had a proxy.pac.  The support load was massive.
> The number of people coming into our office for help setting it up was
> huge.  The number of applications that use HTTP but don't support proxy.pac
> files is surprisingly large.

That's bad, luckily many browsers can turn on autodetection and use it when
available.

> The users leave the campus and have to undo
> it the proxy settings, then redo them when next on campus.

Well, I always call intercepting a thing you should do in "last resort" and
all troubles caused by the interception should be pointed as client errors.

Yes, if you need, keep that there, but I hope you didn't stop providing WPAD
for anyone who supports it.
-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
Nothing is fool-proof to a talented fool. 


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-06 Thread Matus UHLAR - fantomas
> >> On 29.04.09 04:58, nyoman karna wrote:
> >> > you probably may use PAC (as Amos suggested)
> >> > but IMO it ruin the basic idea of using transparent proxy
> >> > (which is user does not need to put any setting in their browser)

> > On Mon, 04 May 2009, Matus UHLAR - fantomas wrote:
> >> the whole idea of intercepting proxy (also called transparent) is sick.

> On Mon, May 4, 2009 at 3:35 PM, Gavin McCullagh  
> wrote:
> > Would you care to substantiate that in a bit more detail?

On 04.05.09 16:41, Jeff Sadowski wrote:
> If your blocking content that would violate rights, maybe; if you are
> doing it to speed things up or blocking sites that have no place in
> the current facility I can not see how it can be claimed as sick.

What is sick is the fact you must break someone's connection and insert
something there, instead of letting him know about a proxy.

Yes, applications that do not support proxy autodetection are problematic
themselves. But that imho doesn't change the fact it's sick.

OTOH, wpad and javascript autodconfiguration is not much better, but it is
still better

-- 
Matus UHLAR - fantomas, uh...@fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
He who laughs last thinks slowest. 


Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-06 Thread Gavin McCullagh
Hi,

On Wed, 06 May 2009, Matus UHLAR - fantomas wrote:

> On 04.05.09 22:35, Gavin McCullagh wrote:
> > Would you care to substantiate that in a bit more detail?
> 
> Making clients think they connect to the destination server when they do
> not, breaks many things. It disables authentication, causes some TCP
> problems (pmtu discovery?)...

Many thanks for the extra info.

Disabling authentication is unfortunate, but anyone managing a network and
proxy server who decides to use transparent proxying necessarily makes the
decision not to use authentication.

PMTU discovery is not something I had thought about I must say.  At a guess
the main issue is that if a router between client and proxy sends a
"datagram too big" to the proxy, it'll have the IP of the upstream host on
it and will not get to the proxy.   In our case (where the MTU is
consistent across the whole path), that won't be an issue but I can see how
it could be.  I guess you could turn off PMTU disovery on the proxy to
solve this, though that's a bit of a sledgehammer.

There would also be an ambiguous MTU for the client (ie that of the
client<->proxy and the client<->server) which would depend on what port the
client was connecting on (eg it could mix http and https).  I'd guess,
perhaps wrongly (and assuming the icmps are not blocked) the client should
just end up with the minimum MTU for both paths?

> That's bad, luckily many browsers can turn on autodetection and use it when
> available.

You mean the browser downloading http://wpad./wpad.dat? This has
been pretty flakey in our experience.  In most cases you seem to have to
turn it on explicitly which is a huge pain as students don't know how.

> Well, I always call intercepting a thing you should do in "last resort" and
> all troubles caused by the interception should be pointed as client errors.

Fair enough.

> Yes, if you need, keep that there, but I hope you didn't stop providing WPAD
> for anyone who supports it.

We still provide it alright, though I don't think it gets used much.  One
of our networks, where we require authentication still use it all the time.

Gavin



Re: [squid-users] Transparent proxy with HTTPS on freebsd

2009-05-07 Thread Amos Jeffries

Gavin McCullagh wrote:

Hi,

On Wed, 06 May 2009, Matus UHLAR - fantomas wrote:


On 04.05.09 22:35, Gavin McCullagh wrote:

Would you care to substantiate that in a bit more detail?

Making clients think they connect to the destination server when they do
not, breaks many things. It disables authentication, causes some TCP
problems (pmtu discovery?)...


Many thanks for the extra info.

Disabling authentication is unfortunate, but anyone managing a network and
proxy server who decides to use transparent proxying necessarily makes the
decision not to use authentication.

PMTU discovery is not something I had thought about I must say.  At a guess
the main issue is that if a router between client and proxy sends a
"datagram too big" to the proxy, it'll have the IP of the upstream host on
it and will not get to the proxy.   In our case (where the MTU is
consistent across the whole path), that won't be an issue but I can see how
it could be.  I guess you could turn off PMTU disovery on the proxy to
solve this, though that's a bit of a sledgehammer.

There would also be an ambiguous MTU for the client (ie that of the
client<->proxy and the client<->server) which would depend on what port the
client was connecting on (eg it could mix http and https).  I'd guess,
perhaps wrongly (and assuming the icmps are not blocked) the client should
just end up with the minimum MTU for both paths?


Should being the operative word. Though the trouble case occurs when the 
proxy tries to send a MTU too big to the client. You see the client 
machine has no knowledge that a TCP link to proxy is open at all and 
disregards the packet. Thus there are problems when the MTU between an 
intercepting proxy is smaller than the MTU between client and server 
directly or proxy and server.


The workaround for this is to sit the proxy as the gateway router or 
direct intermediary. Which may or may not be an option under your packet 
loads.


Additional issues occur when hierarchies of proxies (sometimes needed to 
cope with ISP level loads) move the actual link between proxy->server 
far away.





That's bad, luckily many browsers can turn on autodetection and use it when
available.


You mean the browser downloading http://wpad./wpad.dat? This has
been pretty flakey in our experience.  In most cases you seem to have to
turn it on explicitly which is a huge pain as students don't know how.


wpad./wpad.dat, http://wpad/wpad.dat, http://wpad.TLD>/wpad.dat, whatever URL you configure in DHCP.


Enabling them all is a good idea, and globally having students set "auto 
detect" is a good thing. Flakey or not.
If it works you have none of the issues of interception. If not you have 
interception as a last resort backup.





Well, I always call intercepting a thing you should do in "last resort" and
all troubles caused by the interception should be pointed as client errors.


Fair enough.


Yes, if you need, keep that there, but I hope you didn't stop providing WPAD
for anyone who supports it.


We still provide it alright, though I don't think it gets used much.  One
of our networks, where we require authentication still use it all the time.

Gavin



Amos
--
Please be using
  Current Stable Squid 2.7.STABLE6 or 3.0.STABLE14
  Current Beta Squid 3.1.0.7