On 17/03/11 22:05, arielf wrote:
Hi all,

I am trying to use squid as a forward proxy for target applications using
both http and https sites
I added the following lines to my squid.conf

http_port 3128 ssl-bump key=/path/mykey.pem cert=/path/mycert.pem
ssl_bump allow all

Now I tested on third party http and https sites, and it works nicely :)
However when I try to proxy a portal that I configured the security keys for
it does not work

Please correct me if this is wrong but I suspect your understanding of the terminology is incorrect.

I have not heard tomcat being used as a proxy gateway, so I'm assuming you actually mean it is used as the web app service "server".

"Forward proxy" is a proxy being used by a residential ISP or business to gateway their users out to the general Internet. (there are other uses, but that is the general usage case)

"Reverse proxy" (sometimes called "accelerator proxy") is the type used act as the front interface for a web service.


The setup description reads bit like you are struggling to setup Squid as a reverse proxy for tomcat. Possibly as a forward-proxy for some local clients at the same time. Correct?


 From cache.log:
-----BEGIN SSL SESSION PARAMETERS-----
MHECAQECAgMBBAIANQQg0b4mR/aJ5Vez5HNh6dSwUL4vs/d+v+ceEwKpWxHdFoME
MI3ZqOI/+MjpLLsjIoFchf9dxA/wD9aoZZgrbiq6GRtvOTWRRFeaQA1KFfVgmFo7
FaEGAgRNgfR5ogQCAgEspAIEAA==
-----END SSL SESSION PARAMETERS-----
2011/03/17 07:46:01| SSL unknown certificate error 18 in
/C=IL/ST=NA/L=NA/O=IBM/OU=HRL/CN=Magen
2011/03/17 07:46:01| fwdNegotiateSSL: Error negotiating SSL connection on FD
13: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate
verify failed (1/-1/0)

I actually configured my tomcat and squid with the same security keystore.
Of course tomcat used JKS and squid uses PEM, so I created a self signed JKS
keystore for tomcat and then exported key and cert in PEM format from it to
use for squid.

This is how I did it:
keytool -genkey -keyalg RSA -alias mykey -keystore keystore.jks -storepass
"password" -validity 365
keytool -export -alias mykey -keystore keystore.jks -file mycert.crt
keytool -import -trustcacerts -alias mycert -file mycert.crt -keystore
keystore.jks

keytool -importkeystore -srckeystore keystore.jks -srcstoretype JKS
-deststoretype PKCS12 -destkeystore keystore.p12
openssl pkcs12 -in keystore.p12 -out keystore.pem
openssl rsa -in keystore.pem -out mykey.pem
openssl x509 -in keystore.pem -out mycrt.pem

Then I use: keystore.jks for tomcat, and mykey.pem/mycert.pem for squid

Of course if any of have made this type of configuration work, I am willing
to create any key/cert/keystore for both squid/tomcat since they are both
under my control.

If anyone has an idea how to make this work, I'd be VERY grateful.
Thanks, Ariel.


Amos
--
Please be using
  Current Stable Squid 2.7.STABLE9 or 3.1.11
  Beta testers wanted for 3.2.0.5

Reply via email to