Re: [squid-users] Re: Reverse Proxy SSL + Certificates

From: Henrik Nordstrom <[email protected]>
Date: Mon, 13 Dec 2004 11:11:58 +0100 (CET)

On Mon, 13 Dec 2004, Ow Mun Heng wrote:

> So essentially this means that whatever's being transferred from the
> client (via HTTPS), once it reaches the squid box, it will be sent
> un-encrypted to the server?

Lets put it this way:

any requests accepted by the https_port directive is decrypted by Squid.

Squid-2.5 (without SSL update) is not capable of encrypting requests, or
in other words can not initiate a https request to the backed server, only
http requests (or ftp if you like..).

With Squid-3 (or 2.5 + SSL update) you can ask Squid to reencrypt the
requests to the backend servers. Most easily via the cache_peer directive.

All of this is only related to reverse proxies acting as web servers to
the clients. In forward proxies to the Internet things works very
differently using the CONNECT proxy method. The CONNECT method is never
seen in reverse proxies and only exists between browsers and their
Internet proxies for opening tunnels to Internet servers.

> I believe all these are the requirements, if one were to run squid as a
> surrograte proxy (in front) of a web-server (???)

Depends on what you want to do. Most people doing this likes Squid to
handle the SSL part allowing the web server to focus on the application.

But if your application depends on client-side certificates then
terminating the SSL connection infront of the application server is not an
option and you must publish the web server directly on the Internet
without any surrogate server infront. This because the SSL handshake
involving client certificates requires a direct connection between the
client and the server.

Regards
Henrik
Received on Mon Dec 13 2004 - 03:12:01 MST

This archive was generated by hypermail pre-2.1.9 : Sat Jan 01 2005 - 12:00:02 MST