Re: [RFC] ssl-bump security bugs

From: Amos Jeffries <squid3_at_treenet.co.nz>
Date: Sat, 30 Apr 2011 03:52:27 +1200

On 29/04/11 20:33, Tsantilas Christos wrote:
> On 04/29/2011 08:30 AM, Amos Jeffries wrote:
>> On 29/04/11 05:26, Tsantilas Christos wrote:
>>> On 04/12/2011 11:10 PM, Alex Rousskov wrote:
>>>> On 04/11/2011 11:33 PM, Amos Jeffries wrote:
>>>>> On 12/04/11 03:28, Alex Rousskov wrote:
>>>>>> On 04/10/2011 02:53 AM, Amos Jeffries wrote:
>>>>>>
>>> .....
>>>>>>> * The decrypted requests are not re-encrypted when sent outbound.
>>>>>>> IIRC
>>>>>>> there were measure attempted to make this happen, but they seem to
>>>>>>> have
>>>>>>> been unsuccessful.
>>>
>>> Do we have any such report? Which is the used configuration?
>>> I did some tests here, and also I tried to find such cases but I did not
>>> found. The traffic in my tests always re-encrypted before sent.
>>>
>>
>> I have two users mention replication of this in squid-users.
>>
>> The replicated case seems to be:
>> http_port ... ssl-bump
>> cache_peer ... parent ...
>> always_direct deny all
>
> Yep this is true.
> I think we should consider it as a bug.
> What I am actually getting is the following:
>
> <=https==> [proxy] <===http==>[proxy2]<==https==>
>

Yes that appears to be it. The problems being that a) proxy2 may not
have OpenSSL feature built in to re-crypt, and b) that the middle
channel is cleartext

>
> The easier solution is to add a check in FwdState::connectStart() in
> forward.cc file:
> if (fs->_peer && request->protocol == AnyP::PROTO_HTTPS) {
> anErr = errorCon();
> fail(enErr);
> return;
> }
> The above will just disable any ssl-bumped connection through any parent

As a short-term it may be okay. I don't see that working well with
normal proxied https:// URL requests, but those seem relatively rare.

>
> Also we should define if the "allow-direct" http-port options will have
> any effect in ssl-bump...

allow-direct being an accelerator mode option I think it will be
irrelevant once ssl-bump mode is created.

Since always_direct is documented as recommended, allow-direct behaviour
would seem to be implied for ssl-bump mode.

>
> The ideal I think is to use "CONNECT ..." when connecting through a
> parent proxy. But this is requires more development, I do not know if it
> is required and if we need it...

Yes. I imagine the MITM crowd doing interception of LAN traffic from
local workmates and funneling up to a corporate proxy will want that.

Amos

-- 
Please be using
   Current Stable Squid 2.7.STABLE9 or 3.1.12
   Beta testers wanted for 3.2.0.7 and 3.1.12.1
Received on Fri Apr 29 2011 - 15:52:34 MDT

This archive was generated by hypermail 2.2.0 : Fri Apr 29 2011 - 12:00:07 MDT