Re: [squid-users] Allowing skype through on an ssl bumped proxy

From: Amos Jeffries <>
Date: Wed, 28 Nov 2012 12:03:10 +1300

On 28.11.2012 11:32, Marcus Kool wrote:
> I have seen this issue on 3.1.x and cannot find anything in the
> Changelog
> that indicates that this issue is resolved in 3.3.
> What I observed in 3.1 is that sslbump assumes that all
> CONNECTs are used for SSL-wrapped HTTP traffic and lets
> all applications that use port 443 for other protocols hang
> when the SSL handshake fails.
> Marcus

"How evil can it be? oh. It's interception. Well then."

3.1 and 3.2 as you say, the situation is all-or-nothing. There are also
not going to be any more feature changes to them.

3.3 server-first bumping is a large step in the direction of proper
transparent interception for CONNECT. With server-bump failures it is
possible to take the bumping out of the transaction and relay the
traffic as if bumping was not being performed at all.
  I'm not sure exactly where the testing and operational status of that
particular failover handling is now, but it was one of several design
goals behind server-bump.

So, with my maintainer hat on... If you need HTTPS interception please
skip straight to 3.3. And please report your issues with that one to
*bugzilla* or *squid-dev*.

... back to the question at hand though...

> On 11/27/2012 11:48 AM, Eliezer Croitoru wrote:
>> if it's linux machine try to use firewall rules to block all traffic
>> with TCP-RESET except dst port 80 and 443.
>> This will close some of the things for you.
>> but 3.head 1408 it's kind of old.
>> you can try the latest beta which have pretty good chance of
>> to solve it by the new features.
>> Regards,
>> Eliezer
>> On 11/27/2012 3:19 PM, Sean Boran wrote:
>>> Typically one wishes to block Skype, but I'd like to enable it :-)
>>> Looking at the access.log, the following domains were excluded from
>>> ssl bump:

Please read:

The ACLs should work equally well for ssl_bump_access as for

Received on Tue Nov 27 2012 - 23:03:15 MST

This archive was generated by hypermail 2.2.0 : Thu Nov 29 2012 - 12:00:05 MST