[squid-dev] Bumping after peek and Splicing after stare
Christos Tsantilas
christos at chtsanti.net
Fri May 20 08:20:20 UTC 2016
Hi all,
On peek bumping mode we are sending the client hello message to the
SSL server. The client Hello message normally includes the supported
features by client and a shared key. This is normally makes impossible
to bump the connection after "peek" mode.
On stare mode squid sends its hello message (with its supported features
and its shared keys), and this is make impossible to splice the
connection after stare mode.
However currently we are trying to hack openSSL, if it is possible (the
same features supported by both squid and client) and fill its internal
structures with the hello message sent by client to allow:
- on stare mode splice the connection
- on peek mode bump the connection.
This was possible and worked if squid and web client was build using the
same openSSL library, or for older firefox clients (which used a limit
number of tls extensions).
However recent changes to the source code of openSSL, break this
feature. Moreover the openSSL source code is significant changed in its
trunk repository. The upcoming openSSL releases will have major difference.
Looks that it will be very difficult to maintain this hack. And this is
already make problems to squid. The stare mode may not work in some cases.
The squid code which hacks openSSL is inside adjustSSL function in bio.cc.
I am suggesting to just remove this function and the
SQUID_CHECK_OPENSSL_HELLO_OVERWRITE_HACK configure.ac check.
More information about the squid-dev
mailing list