On 24/03/2012 1:44 a.m., Michał Wiącek wrote:
You seem to be speaking of a interception gateway filter.

SSL was designed to prevent man-in-the-middle attacks (aka interception)
>from being done.

Mayby i sayd wrong - i do not want intercept , but only decise wchich host
can connect

This is not possible. The URL is inside the encryption. You must decrypt
the traffic in order to even see the URL.
I do not want filter all url , only host, if host is encrypte how routers
know whith host connect?

Ah okay language problems.

The destination IP and port is known from TCP. And when the browser is configured to use a proxy it sends the domain name as well. But nothing else is eaisly available for HTTPS.


If I am understanding you right, what you actually want is a whitelist or blacklist of destinations in the firewall. This would work better than what Squid can offer with HTTPS.

In both cases you have the same problems of figuring out and listing what destination IP/host are to be blocked or allowed. The firewall can do it far faster and simpler though.

Amos

Reply via email to