On 10/22/2015 05:59 PM, Leon wrote:

> In regard to the document, I suggest to change the description of
> peek action to "Receive SNI in Client Hello message (step1), or
> server certificate (step2) ...".

I see what you mean now. Done.


Thank you,

Alex.


> -----Original Message-----
> From: Alex Rousskov [mailto:rouss...@measurement-factory.com] 
> Sent: Thursday, October 22, 2015 3:41 PM
> To: squid-users@lists.squid-cache.org
> Cc: Leon <wangxuz...@gmail.com>
> Subject: Re: [squid-users] How to inspect client certificate in ssl_bump
> 
> On 10/22/2015 03:53 PM, Leon wrote:
> 
>> I'm using Squid 3.5. What I'm going to do is setting up a forward 
>> proxy that inspect TLS handshake between client and server then allow 
>> the connection only when following two requirements are met:
>>
>>     1. The server address must be in our whitelist, and the server 
>> must provide a correct server certificate during TLS handshake
>>     2. The client must provide a client certificate during TLS handshake.
>> And the certificate's subject must be in our whitelist
>>
>> I've set up the ssl_bump according to this page:
>> http://wiki.squid-cache.org/Features/SslPeekAndSplice. I don't need to 
>> do any bump. I only need to peek then either splice or terminate.
>>
>> My question is - how to inspect the client certificate? And how to 
>> configure an acl for that?
> 
> 
> Current SslBump code does not support client certificate inspection.
> Squid does not know anything about a bumped client certificate.
> 
> 
>> The document is confusing. It explains the peek action as:
>> peek    step1, step2    Receive SNI and client certificate (step1), or
>> server certificate (step2) while preserving the possibility of 
>> splicing the connection. Peeking at the server certificate usually 
>> precludes future bumping of the connection (see Limitations).
> 
>> But client certificate is not sent at step1 during TLS handshake. 
>> Client certificate is sent after server certificate is received and 
>> the sever also send a "Certificate Request" message.
> 
> That is correct. What do you find confusing about the current description? 
> Please suggest improvements or edit the current text.
> 
> 
>> So I guess I need an additional step (step4)?
> 
> Yes, although client certificate inspection should most likely be done during 
> step3 and/or step4, with the current "final" step3 increased to
> step4 or step5.
> 
> 
>> Is there already someone working on this or I need to create by 
>> myself?
> 
> I am not aware of anybody working on the client certificate inspection in 
> SslBump. Please note that correctly handling client certificates during 
> SslBump requires serious development work and that work needs to be done in 
> the unstable SslBump code (e.g., we are currently rewriting handshake parsing 
> code to make it safe and robust).
> 
> 
> HTH,
> 
> Alex.
> 

_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to