Hi, Amos
>HTTPS encrypted traffic cannot be intercepted.
Yes, I know that. but, in this case, not "transparent".
> (1) (2)
>
> | |
> +------+ | +------------+ | +---------+
> |WWW +---+ | | +----+ WWW |
> |Client|.2 | .1| squid |.1 | .2| Server |
> +------+ +-----+ + tproxy +----+ |(tcp/443)|
> | | (tcp/8080) | | |(tcp/80) |
> | +------------+ | +---------+
> 192.168.0.0/24 10.0.0.0/24
>
> (1) 192.168.0.2 ------> 192.168.0.1:8080
> ^^^^^
> (2) 192.168.0.2 ------> 10.0.0.2:443
> ^^^
Just only thing I'd like to do is "source address spoofing"
using tproxy.
Does that make sense ?
Sincerely,
--
Mikio Kishi
On Thu, Apr 9, 2009 at 10:52 AM, Amos Jeffries <squid3_at_treenet.co.nz> wrote:
>> Hi, all
>>
>> Now, I evaluate the squid3.1.0.6 + tproxy4 environment like the
>> following network.
>>
>> (1) (2)
>>
>> | |
>> +------+ | +------------+ | +---------+
>> |WWW +---+ | | +----+ WWW |
>> |Client|.2 | .1| squid |.1 | .2| Server |
>> +------+ +-----+ + tproxy +----+ |(tcp/443)|
>> | | (tcp/8080) | | |(tcp/80) |
>> | +------------+ | +---------+
>> 192.168.0.0/24 10.0.0.0/24
>>
>> (1) 192.168.0.2 ------> 192.168.0.1:8080
>> (2) 192.168.0.2 ------> 10.0.0.2:80
>>
>> HTTP communication is completely OK !
>> but in HTTPS(using CONNECT method) case
>>
>> (1) 192.168.0.2 ------> 192.168.0.1:8080
>> (2) 192.168.0.2 ------> 10.0.0.2:443
>> ^^^^
>> the following error occurred.
>>
>>> commBind: Cannot bind socket FD 12 to 192.168.0.2: (99) Cannot
>>> assign requested address
>>
>> I think that tunnelStart()#tunnel.cc don't support "COMM_TRANSPARENT"
>>
>>> tunnelStart(ClientHttpRequest * http, int64_t * size_ptr, int*
>>> status_ptr)
>>> {
>>> ... snip ...
>>> sock = comm_openex(SOCK_STREAM,
>>> IPPROTO_TCP,
>>> temp,
>>> COMM_NONBLOCKING, // need COMM_TRANSPARENT
>>> getOutgoingTOS(request),
>>> url);
>>> ... snip ...
>>
>> What do you think ?
>
> HTTPS encrypted traffic cannot be intercepted.
>
> Amos
>
>
>
Received on Thu Apr 09 2009 - 04:15:27 MDT
This archive was generated by hypermail 2.2.0 : Thu Apr 09 2009 - 12:00:02 MDT