<div dir="auto">Thank you for the clarification. </div><br><div class="gmail_quote"><div dir="ltr">On Tue, Apr 10, 2018, 21:11 Alex Rousskov <<a href="mailto:rousskov@measurement-factory.com">rousskov@measurement-factory.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On 04/10/2018 11:24 AM, Panagiotis Bariamis wrote:<br>
> Thank you for your answer but as far as I can understand this setup is<br>
> for a regular proxy that just proxies https protocol with http connect<br>
> headers (unencrypted traffic between client and proxy on http connect<br>
> request ) .<br>
<br>
Your understanding is incorrect: All the traffic between the client and<br>
the proxy is encrypted in that test.<br>
<br>
<br>
> Secure web proxy encrypts traffic between client and proxy<br>
<br>
Yes, and that is what the Polygraph workload sketch tests. The Squid<br>
port for that workload is an https_port, not an http_port.<br>
<br>
<br>
> meaning that you have an http connect request inside a tls tunnel. <br>
<br>
Yes, if the origin server is talking TLS. Just like a regular HTTP<br>
proxy, an HTTPS proxy can proxy both plain and encrypted origin server<br>
traffic. The latter requires a CONNECT tunnel. Whether the origin server<br>
talks HTTP or HTTPS is a separate variable/issue, unrelated to whether<br>
the client-proxy communication itself is secured.<br>
<br>
Polygraph supports HTTPS proxies and HTTPS servers. IIRC, Polygraph v5<br>
supports the combination of the two: TLS inside TLS (because HTTP/2<br>
support essentially required that). I am not sure about Polygraph v4.<br>
The workload I sketched uses HTTPS proxies and plain origin servers.<br>
<br>
<br>
HTH,<br>
<br>
Alex.<br>
<br>
<br>
<br>
> On Tue, Apr 10, 2018, 17:22 Alex Rousskov wrote:<br>
><br>
> On 04/10/2018 06:31 AM, Panagiotis Bariamis wrote:<br>
> > Is there any stress testing tool to test with a load of 1k to 5k<br>
> > simultaneous connections ?<br>
><br>
> Web Polygraph (<a href="http://www.web-polygraph.org" rel="noreferrer noreferrer" target="_blank">www.web-polygraph.org</a> <<a href="http://www.web-polygraph.org" rel="noreferrer noreferrer" target="_blank">http://www.web-polygraph.org</a>>)<br>
> supports HTTPS proxies and can<br>
> create thousands of concurrent connections. Below is a PGL configuration<br>
> snippet from a recent HTTPS proxy test in our lab.<br>
><br>
> HTH,<br>
><br>
> Alex.<br>
><br>
><br>
> SslWrap sslWrap = {<br>
> ssl_config_file = "openssl.conf";<br>
> root_certificate = "CA-priv+pub.pem";<br>
> session_resumption = 70%;<br>
> session_cache = 100;<br>
> };<br>
><br>
> Server S = {<br>
> // no ssl_wraps here unless you want to test TLS inside TLS<br>
> ...<br>
> };<br>
><br>
> Proxy P = {<br>
> addresses = [ ... HTTPS proxy address ... ];<br>
> ssl_wraps = [ sslWrap ]; // this is an HTTPS proxy<br>
> };<br>
><br>
> Robot R = {<br>
> ssl_wraps = [ sslWrap ]; // an HTTPS-capable client<br>
><br>
> origins = S.addresses;<br>
> http_proxies = P.addresses;<br>
><br>
> ...<br>
> };<br>
><br>
> use(S,P,R);<br>
><br>
<br>
</blockquote></div>