On 07/20/2018 03:04 AM, Eliezer Croitoru wrote: > I think we can use MD5/SHA1/SHA256 or even CRC32 to show the "freshness" of > the certificate.
Sorry, you lost me: I see no connection between the previous discussion about CA keys and your new statement about something you call certificate "freshness". > Also this way the ssl_db folder will be free of the burden of tight 600 or > 700 permissions. > > Did I got it right? The stored generated certificates include their private keys so the database should use tight permissions. Alex. > -----Original Message----- > From: Alex Rousskov [mailto:rouss...@measurement-factory.com] > Sent: Thursday, July 19, 2018 11:29 PM > To: Eliezer Croitoru <elie...@ngtech.co.il>; 'Squid Users' > <squid-users@lists.squid-cache.org> > Subject: Re: [squid-users] question about squid and https connection . > > On 07/19/2018 12:08 PM, Eliezer Croitoru wrote: > >> So the ROOT CA key which squid is using is being used for all the fake >> certificates, why do we need so many copies of it? > > FWIW, I cannot think of any reason to store the CA certificate key in > the database of generated certificates. That key is only used to sign a > freshly generated certificate, and the certificate generator never > regenerates certificates, so I do not see the need to reuse that CA key. > > Alex. > > >> -----Original Message----- >> From: Alex Rousskov [mailto:rouss...@measurement-factory.com] >> Sent: Wednesday, July 18, 2018 11:45 PM >> To: Eliezer Croitoru <elie...@ngtech.co.il>; 'Squid Users' >> <squid-users@lists.squid-cache.org> >> Subject: Re: [squid-users] question about squid and https connection . >> >> On 07/18/2018 02:23 PM, Eliezer Croitoru wrote: >> >> >>> Every certificate have the same properties of the original one except >>> the "RSA key" part which it's certifiying. >> >> Assuming you are talking about the generated certificates for the same real >> certificate X, then yes, they will all have the same (mimicked) fields. >> Whether they will be signed by the same CA depends on Squid configuration. >> In my answers, I assumed that all those Squids are configured with the same >> CA (including the same private key). >> >> >>> So what I'm saying is that you cannot say that every certificate which >>> will be created with the same CA will be the same for two different >>> 2048 bits RSA keys. >> >> ... unless the keys are also the same, which was my and, AFAICT, OP >> assumption. >> >> Also, unless you are doing something nasty, it probably does not make sense >> to configure a bumping Squid with a public CA certificate that is identical >> to some other public CA certificate but has a different private key. In >> other words, if you are using 200 Squids with a single public CA >> certificate, then all those Squids should use the same private key. >> >> Alex. >> >> >> >>> -----Original Message----- >>> From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] >>> On Behalf Of Alex Rousskov >>> Sent: Friday, July 13, 2018 2:01 AM >>> To: 'Squid Users' <squid-users@lists.squid-cache.org> >>> Subject: Re: [squid-users] question about squid and https connection . >>> >>> On 07/12/2018 02:35 PM, Eliezer Croitoru wrote: >>> >>>> Every RSA key and certificate pair regardless to the origin server >>>> and the SSL-BUMP enabled proxy can be different. >>> >>> I cannot find a reasonable interpretation of the above that would >>> contradict what I have said. Yes, each unique certificate has its own >>> private key, but that is not what Ahmad was asking about AFAICT. >>> >>> >>>> Will it be more accurate to say that just as long as these 200 squid >>>> instances(different squid.conf and couple other local variables) use >>>> the same exact ssl_db cache directory then it's probable that they >>>> will use the same certificate. >>> >>> That statement is incorrect. Squids configured with different CA >>> certificates will generate different fake certificates for the same >>> real certificate. >>> >>> I assume that Ahmad was asking about a situation where 200 Squid >>> instances had the same configuration (including CA certificates). >>> >>> Please note that the certificate generator helper gets the signing >>> (CA) certificate as a parameter with each generation request (because >>> different Squid ports may use different CA certificates). Also, Squid >>> probably does not officially support sharing the certificate directory >>> across Squid instances (even if it works). >>> >>> >>>> Or these 200 squid instances are in SMP mode with 200 workers... If >>>> these 200 instances do not share memory and certificate cache then >>>> there is a possibility that the same site from two different sources >>>> will serve different certificates(due to the different RSA key which >>>> is different). >>> >>> 200 SMP workers or 200 identically-configured Squid instances will >>> generate the same fake certificates for the same real certificate. >>> "Stable certificates" is an important requirement for many distributed >>> Squid deployments. >>> >>> Alex. >>> >>> >>> >>>> -----Original Message----- >>>> From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] >>>> On Behalf Of Alex Rousskov >>>> Sent: Thursday, July 12, 2018 11:27 PM >>>> To: --Ahmad-- <ahmed.za...@netstream.ps>; Squid Users >>>> <squid-users@lists.squid-cache.org> >>>> Subject: Re: [squid-users] question about squid and https connection . >>>> >>>> On 07/12/2018 01:17 PM, --Ahmad-- wrote: >>>> >>>>> if i have pc# 1 and that pc open facebook . >>>>> >>>>> then i have other pc # 2 and that other pc open facebook . >>>>> >>>>> >>>>> now as we know facebook is https . >>>>> >>>>> so is the key/ cert that used on pc # 1 is same as cert in pc # 2 to >>>>> decrypt the fb encrypted traffic ? >>>> >>>> Certificates themselves are not used (directly) to decrypt traffic >>>> AFAIK, but yes, both PCs will see the same server certificate >>>> (ignoring CDNs and other complications). >>>> >>>> >>>> >>>>> now in the presence of squid . >>>>> >>>>> if i used tcp connect method , will it be different than above ? >>>> >>>> If you are not bumping the connection, then both PCs will see the >>>> same real Facebook certificate as if those PCs did not use a proxy. >>>> >>>> If you are bumping the connection, then both PCs will see the same >>>> fake certificate generated by Squid. >>>> >>>> >>>> >>>>> say i used 200 proxies in same squid machine and i used to access FB from >>>>> the same pc same browser . >>>>> >>>>> will facebook see my cert/key i used to decrypt its traffic ? >>>> >>>> If you are asking whether Facebook will know anything about the fake >>>> certificate generated by Squid for clients, then the answer is "no, >>>> unless Facebook runs some special client code to deliver (Squid) >>>> certificate back to Facebook". >>>> >>>> In general, the origin server assumes that the client is talking to >>>> it directly. Clients may pin or otherwise restrict certificates that >>>> they trust, but after the connection is successfully established, the >>>> server may assume that it is talking to the client directly. A >>>> paranoid server may deliver special code to double check that >>>> assumption, but there are other, more standard methods to prevent >>>> bumping such as certificate pinning and certificate transparency cervices. >>>> >>>> >>>> >>>>> is the key/cert of FB to decrypt the https content is same on all >>>>> browsers on all computers ? >>>> >>>> If you are asking whether the generated certificates are going to be >>>> the same for all clients, then the answer is "yes, provided all those >>>> 200 Squids use the same configuration (including the CA certificate) >>>> and receive the same real certificate from Facebook". Squid's >>>> certificate generation algorithm generates the same certificate given >>>> the same configuration and the same origin server certificate. >>>> >>>> >>>> HTH, >>>> >>>> Alex. >>>> _______________________________________________ >>>> squid-users mailing list >>>> squid-users@lists.squid-cache.org >>>> http://lists.squid-cache.org/listinfo/squid-users >>>> >>> >>> _______________________________________________ >>> squid-users mailing list >>> squid-users@lists.squid-cache.org >>> http://lists.squid-cache.org/listinfo/squid-users >>> >> > _______________________________________________ squid-users mailing list squid-users@lists.squid-cache.org http://lists.squid-cache.org/listinfo/squid-users