LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Server
User Name
Password
Linux - Server This forum is for the discussion of Linux Software used in a server related context.

Notices


Reply
  Search this Thread
Old 01-07-2014, 04:24 PM   #1
landysaccount
Member
 
Registered: Sep 2008
Location: Dominican Republic
Distribution: Debian
Posts: 188

Rep: Reputation: 18
Facebook traffic from mobiles doesn't pass through squid


Hello.

I am experiencing some problems with facebook apps or facebook for mobile sites. I have two servers: one for regular traffic and the other for facebook and youtube.

For some reason, traffic to facebook from mobiles apps doesn't pass through the facebook server... Read something somewhere that these apps use HTTPS for their communication.

How if possible, can I send ALL facebook (http and https) traffic to the other server or cache_peer?

Thanks in advanced for your time and help.
 
Old 01-08-2014, 05:48 PM   #2
sag47
Senior Member
 
Registered: Sep 2009
Location: Raleigh, NC
Distribution: Ubuntu, PopOS, Raspbian
Posts: 1,899
Blog Entries: 36

Rep: Reputation: 477Reputation: 477Reputation: 477Reputation: 477Reputation: 477
Quote:
Originally Posted by landysaccount View Post
How if possible, can I send ALL facebook (http and https) traffic to the other server or cache_peer?
You can't cache SSL traffic on the client side proxy server. That would require a man in the middle attack where you negotiate SSL on both ends of the squid server (which is unethical and frowned upon).
 
Old 01-10-2014, 04:28 AM   #3
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Quote:
Originally Posted by sag47 View Post
negotiate SSL on both ends of the squid server (which is unethical and frowned upon).
Perfectly ethical and acceptable as long as the users of the squid server are aware of it and accept it as part of their conditions for being able to access the internet via that particular network. This is why we have a policy document on internet usage from our work wired and wireless network, as part of our conditions if anyone wants their work e-mail on their personal phone they also have to sign remote block / wipe waivers.
 
Old 01-10-2014, 05:13 PM   #4
sag47
Senior Member
 
Registered: Sep 2009
Location: Raleigh, NC
Distribution: Ubuntu, PopOS, Raspbian
Posts: 1,899
Blog Entries: 36

Rep: Reputation: 477Reputation: 477Reputation: 477Reputation: 477Reputation: 477
Quote:
Originally Posted by TenTenths View Post
Perfectly ethical and acceptable as long as the users of the squid server are aware of it and accept it as part of their conditions for being able to access the internet via that particular network. This is why we have a policy document on internet usage from our work wired and wireless network, as part of our conditions if anyone wants their work e-mail on their personal phone they also have to sign remote block / wipe waivers.
I would disagree if one is accessing any website requiring security over SSL. I don't have a personal phone but a work phone. I keep a personal phone for personal communication and work can do what they want to my work phone. However, many companies require a "BYOD" policy of which I probably wouldn't ever consider myself. Back to the topic at hand I would disagree about the SSL middle man policy because it would violate my personal privacy to websites which would matter (banking websites are just one example). SSL is a privacy guarantee stating that the website you're accessing is whom they claim to be verified by a trusted third party. I would not consider a caching proxy server a trusted third party for banking information nor any website attempting to complete a purchase where you enter personal credit information. I would consider the company open for liability claims if such a server were compromised (even if a user did sign a "waiver" if the security of the server is negligent not meeting certain standards). PCI being one of many standards since it will likely cache credit card information and who knows what else (facebook takes credit card information).

If a company decides that they are going to only target "certain" websites for SSL man in the middle attacks then it is easily bypassed by an SSL proxy. And if they block proxies it is bypassed by SSH tunneling and modifying the hosts file to point to localhost (for e.g. facebook). In my opinion, it would just lead to an arms race of bypassing by the end user (which I'm sure is grounds for termination upon bypassing). The point I'm making is man in the middle attacking SSL is both unethical and frowned upon. Mozilla has a discussion on this where they talk about implementing built-in fingerprint verification on popular websites so that they can warn the user when this "trusted" man in the middle is happening. Google is doing the same thing with Chrome. It breaks the very purpose and trust model of SSL. In fact, this is such a big problem that the IETF is drafting a specification for certificate pinning in browsers that will likely be implemented in the future.

Caching plain text is okay. Attempting to man in the middle and cache SSL is not okay and a liability suit waiting to happen. I would consider this a hostile company/work environment and wouldn't ever work for such a company. I'd probably then whistle-blow the company policy while I'm at it.

Last edited by sag47; 01-10-2014 at 05:39 PM.
 
Old 01-10-2014, 05:56 PM   #5
descendant_command
Senior Member
 
Registered: Mar 2012
Posts: 1,876

Rep: Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643
So use your own connection for your private comms.
 
Old 01-13-2014, 02:47 AM   #6
TenTenths
Senior Member
 
Registered: Aug 2011
Location: Dublin
Distribution: Centos 5 / 6 / 7
Posts: 3,475

Rep: Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553Reputation: 1553
Quote:
Originally Posted by sag47 View Post
PCI being one of many standards since it will likely cache credit card information and who knows what else (facebook takes credit card information).
Once you start talking about PCI it becomes a WHOLE different issue. There is an auditor school of thought that any SSL web usage from within a PCI compliant environment be put through an SSL proxy with DLP scanning to prevent the transmission of credit card numbers to end sites.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
blocking facebook on squid anis123 Linux - Server 1 09-10-2013 09:02 AM
Redirecting trasparent squid traffic to squid by using iptables imran76 Linux - Security 1 03-13-2012 07:49 AM
Facebook and Squid privacy qwertyjjj Linux - Software 6 12-23-2009 06:29 PM
nVidia forceware ethernet port doesn't pass traffic Peter Clark Linux - Networking 1 11-30-2008 09:40 AM
Traffic still going pass Firewall extremebfn Linux - Networking 1 10-04-2004 01:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Server

All times are GMT -5. The time now is 01:27 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration