<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<br>
-----BEGIN PGP SIGNED MESSAGE----- <br>
Hash: SHA1 <br>
<br>
WCCP only, of course. To reduce Cisco CPU usage.<br>
<br>
Also, iOS version 15.4 with SECURITYK9 techno pack activated.<br>
<br>
31.12.2014 2:21, Rafael Akchurin пишет:<br>
<span style="white-space: pre;">><br>
> Just for me to completely clarify:<br>
><br>
> <br>
><br>
> - how exactly your Squid gets the traffic from your clients?
(explicit proxy or cisco WCCP?)<br>
><br>
> <br>
><br>
> raf<br>
><br>
> *From:*Yuri Voinov [<a class="moz-txt-link-freetext" href="mailto:yvoinov@gmail.com">mailto:yvoinov@gmail.com</a>]<br>
> *Sent:* Tuesday, December 30, 2014 9:16 PM<br>
> *To:* Rafael Akchurin; <a class="moz-txt-link-abbreviated" href="mailto:squid-users@lists.squid-cache.org">squid-users@lists.squid-cache.org</a><br>
> *Subject:* Re: [squid-users] Squid 3 SSL bump: Google drive
application could not connect<br>
><br>
> <br>
><br>
><br>
> To finalize a solution,<br>
><br>
> see the our favorite:<br>
><br>
>
<a class="moz-txt-link-freetext" href="http://www.squid-cache.org/mail-archive/squid-users/201406/0369.html">http://www.squid-cache.org/mail-archive/squid-users/201406/0369.html</a><br>
><br>
> Why use iptables, ipfilter,Cisco, etc?!<br>
><br>
> Only Squid, only hardcore!<br>
><br>
> Revert cisco config back:<br>
><br>
> R2911(config)#no access-list 121<br>
> R2911(config)#access-list 121 remark ACL for HTTPS WCCP<br>
> R2911(config)#access-list 121 remark Squid proxies bypass<br>
> R2911(config)#access-list 121 deny ip host 192.168.200.3
any<br>
> R2911(config)#access-list 121 deny ip host 192.168.100.251
any<br>
> R2911(config)#access-list 121 remark Videoserver<br>
> R2911(config)#access-list 121 deny ip host 192.168.200.5
any<br>
> R2911(config)#access-list 121 remark LAN clients proxy port
443<br>
> R2911(config)#access-list 121 permit tcp 192.168.0.0
0.0.255.255 any eq 443<br>
> R2911(config)#access-list 121 remark all others bypass WCCP<br>
> R2911(config)#access-list 121 deny ip any any<br>
> R2911(config)#^Z<br>
> R2911#wr<br>
> Building configuration...<br>
> [OK]<br>
><br>
> Write acl file with IP/net with SSL Pinning:<br>
><br>
> root @ ktulhu /usr/local/squid/etc # cat dst.nobump<br>
> # BCC bypass<br>
> 91.198.63.0/24<br>
> # Salyk bypass<br>
> 212.154.165.148/32<br>
> # WU bypass<br>
> 191.232.0.0/13<br>
> 65.52.0.0/14<br>
> # Symantec bypass<br>
> 195.215.221.99/32<br>
> 195.215.221.104/32<br>
> 213.248.114.172/32<br>
> 213.248.114.173/32<br>
> 213.248.114.174/32<br>
> 213.248.114.175/32<br>
> 77.67.22.168/32<br>
> 77.67.22.171/32<br>
> 77.67.22.173/32<br>
> 213.248.114.171/32<br>
><br>
> Add needful nets/apps to acl by your taste.<br>
><br>
> Add to squid config:<br>
><br>
> # SSL bump acl<br>
> acl net_bump src "/usr/local/squid/etc/net.bump"<br>
> # HTTP-use 443 port apps<br>
> acl url_nobump dstdom_regex \.icq\.*<br>
> # SSL Pinning servers. Only ip-based dst acl!<br>
> acl dst_nobump dst "/usr/local/squid/etc/dst.nobump"<br>
><br>
> # SSL bump rules<br>
> sslproxy_cert_error allow all<br>
> ssl_bump none localhost<br>
> ssl_bump none url_nobump<br>
> ssl_bump none dst_nobump<br>
> ssl_bump server-first net_bump<br>
><br>
> Yahooo! The same result with Squid only!<br>
><br>
> 30.12.2014 23:39, Rafael Akchurin пишет:<br>
> > SSL Pinning<br>
><br>
></span><br>
<br>
-----BEGIN PGP SIGNATURE-----
<br>
Version: GnuPG v2
<br>
<br>
iQEcBAEBAgAGBQJUowmnAAoJENNXIZxhPexGEtwH/10nuDG9+Z7AG2W+nh64X7JV
<br>
5JmvvaC778yUYnMUaPJTLPK3hxVuQshVMaE2x4jhuxBEkhtKPWBJZg8JFLFinzf5
<br>
nDINk8zz0j4fLCXmDAJaXz2NMacUviCiKFY8k63SumxKeTIBU20DuLk9glggTpfY
<br>
3RgdNWfvmma9iv8QW/s2UJFbRdJS0cLjra4XFFQBZLyGEJPTOcft3slWX3QgHVCD
<br>
SB3CZWy2gwbLVphiCiG91HxBtUUUzSLqPc60RdSwOCoSOaBMHZgy8yjZ8VRgQkyi
<br>
uz41hhp1mCMfssNjoLdCvr/AxJG990yQ24MiCDuzN9fYVNzUPdXF+q4E5G/avtk=
<br>
=FkuL
<br>
-----END PGP SIGNATURE-----
<br>
<br>
</body>
</html>