[squid-users] T3/T3S Protocol

Amos Jeffries squid3 at treenet.co.nz
Sun Apr 12 07:17:49 UTC 2015


On 12/04/2015 4:41 p.m., Farci, Anatole V wrote:
> Hi,
> 
> I have a JavaClient that uses T3S:443 to connect to Oracle's WLS
application server. WLS is in DMZ and I have Squid proxy between the DMZ
and our Intranet (in its own DMZ) to fwd all requests to WLS. The ports
(443) is open since the browsers can talk to the WLS but it appears that
the T3S is not going thru the proxy. I have searched to see what I can
add to allow this T3 (RMI protocol) to go thru and our Squid
configuration is very simple and have a whitelist and allows all traffic
on port 80 and 443 to go thru.
> 
> On the client side, I get this error:
> javax.naming.CommunicationException [Root exception is java.net.ConnectException: t3s://xxxx.yyy.intel.com:443: Destination xxx.yyy.zzz.www, 443 unreachable; nested exception is:
>         java.net.ConnectException: Connection timed out: connect; No available router to destination]

Does this Java application support HTTP proxying ?

Squid is an HTTP proxy, use of any other protocol over it has to be via
HTTP mechanisms. CONNECT requests in this case. It wont help at all if
the Java application cannot do HTTP enough to perform an HTTP CONNECT
request.

> 
> on the Squid Acccess.log where <dns> and <fqdn> are the correct values and using a browser, I can open reach the WLS with either of them using HTTPS:443
> 1428776399.835  27238 10.254.98.83 TCP_MISS/200 2439 CONNECT <dns>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 1428776414.999  15117 10.254.98.83 TCP_MISS/200 2199 CONNECT <dns>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 1428776430.068  27768 10.254.98.83 TCP_MISS/200 9658 CONNECT <dns>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 1428776445.200  15085 10.254.98.83 TCP_MISS/200 2439 CONNECT <dns>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 1428776460.396  15118 10.254.98.83 TCP_MISS/200 2439 CONNECT <dns>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 1428776480.270  15211 10.254.98.83 TCP_MISS/200 9722 CONNECT <FQDN>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 1428776495.293  27207 10.254.98.83 TCP_MISS/200 2439 CONNECT <dns>.intel.com:443 - DIRECT/xxx.yyy.zzz.www -
> 

Yes. However note that HTTPS != T3S


> Store.log has this one entry only:
> 1428773672.888 RELEASE -1 FFFFFFFF 93F32BC091B147DF27B4355731396BC9  200 1428770072 1428770072 1428773672 application/cache-digest 144/144 GET internal://proxy..intel.com/squid-internal-periodic/store_digest
> 

CONNECT are not cacheable. There is nothing that can be stored to disk.


> and the squid config looks like this:
> visible_hostname proxy.intel.com
> http_port 912

APEX and HTTP protocols are not safe to be mixing up. Use of 3128 is
sufficient for Squid proxy (its even registered for Squid use).

> 
> logfile_rotate 30
> cache_access_log C:/squid/var/logs/access.log

That should be:
 access_log C:/squid/var/logs/access.log


> 
> acl all src 0.0.0.0/0.0.0.0
> acl whitelist dstdomain .intel.com
> acl http proto http t3
> acl port_80 port 80
> acl port_443 port 443
> acl port_23791 port 23791
> acl CONNECT method CONNECT
> 
> 
> # rules allowing non-authenticated users
> http_access allow http port_80 whitelist
> http_access allow CONNECT port_443 whitelist
> http_access allow CONNECT port_23791 whitelist

Highly dangerous. Please use the recommended defaults:

 acl SSL_ports port 443
 acl Safe_ports port 80          # http
 acl Safe_ports port 21          # ftp
 acl Safe_ports port 443         # https
 acl Safe_ports port 70          # gopher
 acl Safe_ports port 210         # wais
 acl Safe_ports port 1025-65535  # unregistered ports
 acl Safe_ports port 280         # http-mgmt
 acl Safe_ports port 488         # gss-http
 acl Safe_ports port 591         # filemaker
 acl Safe_ports port 777         # multiling http

 http_access deny !Safe_ports
 http_access deny CONNECT !SSL_ports

 # Then your bit...
 http_access allow whitelist

 http_access deny all


Amos


More information about the squid-users mailing list