<div dir="ltr">Hi Amos, <div><br></div><div>Thank you for your reply. </div><div><br></div><div>The information I need to apply to the header is client specific, ex their internal ip address. </div><div><br></div><div>The issue I am facing is that the network that is hosting the web services is different from the network that the clients are accessing it from. So my Squid instances live at the client site and they access the web services out of a data center. </div><div><br></div><div>I need to know the clients internal ip at the data center for a number of reasons. Therefore if I am understanding your suggestion correctly the reverse ssl proxy would not work as the squid reverse proxy needs to be on the same internal network/vlan as the destination host to function? <a href="http://wiki.squid-cache.org/ConfigExamples/Reverse/SslWithWildcardCertifiate">http://wiki.squid-cache.org/ConfigExamples/Reverse/SslWithWildcardCertifiate</a></div><div><br></div><div>Essentially what I have is the clients internal ip at the client site, which with HTTP only used to allow me the pack the internal ip into the HTTP header via 'request_header_add'. Now, I still need to get the internal ip into the HTTPS request so that the web services can operate as normal. Whether the clients internal ip is in the header or apart of each request (query param) doesnt really matter, just how can I get the internal ip to the server without disrupting the normal browsing activity of our users?</div><div><br></div><div>Please let me know if I have misunderstood your suggestion about the reverse proxy. FWIW we use nginx as a reverse proxy at the datacenter to load balance and handle certain API endpoints.</div><div><br></div><div>Thanks, </div><div><br></div><div>James</div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Sun, Feb 15, 2015 at 4:45 PM, Amos Jeffries <span dir="ltr"><<a href="mailto:squid3@treenet.co.nz" target="_blank">squid3@treenet.co.nz</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA1<br>
<br>
</span><span class="">On 16/02/2015 11:46 a.m., Yuri Voinov wrote:<br>
><br>
><br>
> 16.02.15 4:40, James Beecham пишет:<br>
>> Hi Yuri,<br>
><br>
>> Thank you.<br>
><br>
>> Are these HTTPS CONNECT requests coming over port 80? If not<br>
>> would I need<br>
><br>
> It depends. In different configurations uses different ports. In<br>
> transparent interception mode your absolutely need separate ports<br>
> for HTTP/HTTPS. In forwarding mode you cah use one port, but with<br>
> SSL parameters.<br>
><br>
<br>
</span>And James, since you are domain admin the question becomes why are you<br>
not running a reverse-proxy "https_port 443" with your domain cert to<br>
receive the HTTPS traffic and forward it to the origin servers?<br>
<br>
Amos<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v2.0.22 (MingW32)<br>
<br>
iQEcBAEBAgAGBQJU4T2TAAoJELJo5wb/XPRjAmAIAK5HfCAwSMUCXIeFNIPzppBG<br>
24i0loL2Bhg9z/J9ec0iENOEO4XV0LPkNQT2UmyRxO4HZis5Su3Hc8R50tG6mrPf<br>
EdU1H+nTUTygGQkm3nK7OmfdbSy/kV6aXmLM4pToYwwV3j15GDlW0wA0DN9JZhIG<br>
WIBfwb+fCcjD5FJq9HWdGajeWgT9yuT54ufqrRJyjnq2LQMW8q7kbxrr6ue9eZxZ<br>
9Fsz1GnoneHO5nQ1BHbp/rTo+GCEfZLO+r87/6tCcYkYmtKsvP6kI7fCCSE1X0N6<br>
bjUj1iya5Ec92PsPc2ubmemTBIL/P572nO15fKesxlSYWCsdkpsbA0bygiksbZI=<br>
=ZEKG<br>
-----END PGP SIGNATURE-----<br>
<div class="HOEnZb"><div class="h5">_______________________________________________<br>
squid-users mailing list<br>
<a href="mailto:squid-users@lists.squid-cache.org">squid-users@lists.squid-cache.org</a><br>
<a href="http://lists.squid-cache.org/listinfo/squid-users" target="_blank">http://lists.squid-cache.org/listinfo/squid-users</a><br>
</div></div></blockquote></div><br></div>