[VW 7.6] does HTTPS work with proxy servers ?

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
13 messages Options
Reply | Threaded
Open this post in threaded view
|

[VW 7.6] does HTTPS work with proxy servers ?

Mark Pirogovsky-3
Hello All,

Our application tries to connect to the Web using HTTPS and HTTP.
User sets a proxy information in the normal way.
And the HTTP traffic seem to work fine ( most of the time).

However the end  user reported the following trouble with the HTTPS

"The proxy servers reports null characters and unsupported method.
I have checked the connect acl, which is allowed on port 443. Squid
cache.log show this king of message :

2011/01/19 10:30:40| parseHttpRequest: Requestheader contains NULL
characters
2011/01/19 10:30:40| parseHttpRequest: Unsupported method ''
2011/01/19 10:30:40| clientReadRequest: FD 492 (192.168.17.220:1105)
Invalid Request

the access.log show

1295431093.651     15 192.168.17.220 TCP_DENIED/400 1612 NONE
error:unsupported-request-method - NONE/- text/html"

So I have few questions:

1.Does anyone know is there solution for this?
2. Can vw 7.6 use proxy for the HTTPS ?
3. There is a patch published for the VW 7.7 to address similar issue  
- can this patch be applied to the VW 7.6 ?

4. Can anyone here suggest a way to test the proxy servers. Do I need to
install one and which one ? or is there any type of public Proxy I can use ?


Any information is greatly appreciated.

Regards,

--Mark Pirogovsky


_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW 7.6] does HTTPS work with proxy servers ?

davidbuck
Contact Cincom Support and ask for their fix for this problem.

David Buck

Sent from my BlackBerry device on the Rogers Wireless Network

-----Original Message-----
From: Mark Pirogovsky <[hidden email]>
Sender: [hidden email]
Date: Wed, 19 Jan 2011 12:36:59
To: vwnc List<[hidden email]>
Subject: [vwnc] [VW 7.6]   does HTTPS work with proxy servers ?

Hello All,

Our application tries to connect to the Web using HTTPS and HTTP.
User sets a proxy information in the normal way.
And the HTTP traffic seem to work fine ( most of the time).

However the end  user reported the following trouble with the HTTPS

"The proxy servers reports null characters and unsupported method.
I have checked the connect acl, which is allowed on port 443. Squid
cache.log show this king of message :

2011/01/19 10:30:40| parseHttpRequest: Requestheader contains NULL
characters
2011/01/19 10:30:40| parseHttpRequest: Unsupported method ''
2011/01/19 10:30:40| clientReadRequest: FD 492 (192.168.17.220:1105)
Invalid Request

the access.log show

1295431093.651     15 192.168.17.220 TCP_DENIED/400 1612 NONE
error:unsupported-request-method - NONE/- text/html"

So I have few questions:

1.Does anyone know is there solution for this?
2. Can vw 7.6 use proxy for the HTTPS ?
3. There is a patch published for the VW 7.7 to address similar issue  
- can this patch be applied to the VW 7.6 ?

4. Can anyone here suggest a way to test the proxy servers. Do I need to
install one and which one ? or is there any type of public Proxy I can use ?


Any information is greatly appreciated.

Regards,

--Mark Pirogovsky


_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW 7.6] does HTTPS work with proxy servers ?

mkobetic
In reply to this post by Mark Pirogovsky-3
Proxy support for HTTPS was added in 7.7.1, so 7.6 wouldn't be able to get through a proxy using HTTPS. I don't know off the top of my head how difficult it would be to backport the changes.

Martin

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

[VW:7.6]SSL BadCertificate

Simon Peter-2
In reply to this post by Mark Pirogovsky-3
Hi, I am having the below situation
I have exported an SSl certificate with CN = *.mySpace.com.
This is supposed to be the wild card for all hosts included in mySpace.com
Now, I am trying  HTTPS POST on 'interface.mySpace.com' and on validation of
the certificate chain, the below validationBlock excecution returns false
and i get an SSLBadCertificate


validationBlock

^validationBlock isNil
  ifTrue: [ [ :dnd | "Let's emulate web browser validation as default"
     hostName = (dnd at: 'CN') ] ]
  ifFalse: [ validationBlock ]


(here hostname='interface.mySpace.com and
dnd at:CN  = *.mySpace.com)

Can anyone suggest some solution?

Thanks in advance,

Simon

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

mkobetic
This is fixed in the upcoming 7.8 release, we will allow wildcard certificates by default. In the meantime you'll have to override the default validation block with your own, more permissive one. Unfortunately there isn't an easy way to do it globally in previous releases. You'll either have to set it explicitly for specific servers or you'll have to modify the default block in the NetClient code.

HTH,

Martin

"Simon Peter"<[hidden email]> wrote:

> I have exported an SSl certificate with CN = *.mySpace.com.
> This is supposed to be the wild card for all hosts included in mySpace.com
> Now, I am trying  HTTPS POST on 'interface.mySpace.com' and on validation of
> the certificate chain, the below validationBlock excecution returns false
> and i get an SSLBadCertificate
>
>
> validationBlock
>
> ^validationBlock isNil
>   ifTrue: [ [ :dnd | "Let's emulate web browser validation as default"
>      hostName = (dnd at: 'CN') ] ]
>   ifFalse: [ validationBlock ]
>
>
> (here hostname='interface.mySpace.com and
> dnd at:CN  = *.mySpace.com)
>
> Can anyone suggest some solution?
>
> Thanks in advance,
>
> Simon
>
> _______________________________________________
> vwnc mailing list
> [hidden email]
> http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
>
>


_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

Boris Popov, DeepCove Labs (SNN)
Thanks, Martin. This is good news, we keep an override, but this would be better.

Sent from my iPhone

On 28 Jan 2011, at 10:37, "[hidden email]" <[hidden email]> wrote:

> This is fixed in the upcoming 7.8 release, we will allow wildcard certificates by default. In the meantime you'll have to override the default validation block with your own, more permissive one. Unfortunately there isn't an easy way to do it globally in previous releases. You'll either have to set it explicitly for specific servers or you'll have to modify the default block in the NetClient code.
>
> HTH,
>
> Martin
>
> "Simon Peter"<[hidden email]> wrote:
>> I have exported an SSl certificate with CN = *.mySpace.com.
>> This is supposed to be the wild card for all hosts included in mySpace.com
>> Now, I am trying  HTTPS POST on 'interface.mySpace.com' and on validation of
>> the certificate chain, the below validationBlock excecution returns false
>> and i get an SSLBadCertificate
>>
>>
>> validationBlock
>>
>> ^validationBlock isNil
>>  ifTrue: [ [ :dnd | "Let's emulate web browser validation as default"
>>     hostName = (dnd at: 'CN') ] ]
>>  ifFalse: [ validationBlock ]
>>
>>
>> (here hostname='interface.mySpace.com and
>> dnd at:CN  = *.mySpace.com)
>>
>> Can anyone suggest some solution?
>>
>> Thanks in advance,
>>
>> Simon
>>
>> _______________________________________________
>> vwnc mailing list
>> [hidden email]
>> http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
>>
>>
>
>
> _______________________________________________
> vwnc mailing list
> [hidden email]
> http://lists.cs.uiuc.edu/mailman/listinfo/vwnc

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

Boris Popov, DeepCove Labs (SNN)
Martin,

While we're on the subject (pun not intended), could you tell me if the
following problem had also been addressed?

When making an unsecured request via http that immediately results in a
302 to https address, the validation block isn't preserved on the new
connection, so subject validation fails in the following snippet,

c := (HttpClient new)
        validationBlock: [:dnd | dnd CN match: self hostName];
        yourself.
c executeRequest: (HttpRequest get: 'http://demo.deepcovelabs.com')

The problem could be narrowed down to the below method,

NetProtocolInterpreter>>useSecureConnection
        self loadSecureConnection.
        connection := self sslConnectionClass new.

C:\Users\Administrator>curl -i http://demo.deepcovelabs.com
HTTP/1.0 302 Found
Location: https://demo.deepcovelabs.com/online
Server: BigIP
Connection: Keep-Alive
Content-Length: 0

Thanks,

-Boris

-----Original Message-----
From: [hidden email] [mailto:[hidden email]] On
Behalf Of Boris Popov, DeepCove Labs
Sent: Friday, January 28, 2011 10:40 AM
To: [hidden email]
Cc: vwnc List
Subject: Re: [vwnc] [VW:7.6]SSL BadCertificate

Thanks, Martin. This is good news, we keep an override, but this would
be better.

Sent from my iPhone

On 28 Jan 2011, at 10:37, "[hidden email]" <[hidden email]>
wrote:

> This is fixed in the upcoming 7.8 release, we will allow wildcard
certificates by default. In the meantime you'll have to override the
default validation block with your own, more permissive one.
Unfortunately there isn't an easy way to do it globally in previous
releases. You'll either have to set it explicitly for specific servers
or you'll have to modify the default block in the NetClient code.

>
> HTH,
>
> Martin
>
> "Simon Peter"<[hidden email]> wrote:
>> I have exported an SSl certificate with CN = *.mySpace.com.
>> This is supposed to be the wild card for all hosts included in
>> mySpace.com Now, I am trying  HTTPS POST on 'interface.mySpace.com'
>> and on validation of the certificate chain, the below validationBlock

>> excecution returns false and i get an SSLBadCertificate
>>
>>
>> validationBlock
>>
>> ^validationBlock isNil
>>  ifTrue: [ [ :dnd | "Let's emulate web browser validation as default"
>>     hostName = (dnd at: 'CN') ] ]
>>  ifFalse: [ validationBlock ]
>>
>>
>> (here hostname='interface.mySpace.com and dnd at:CN  = *.mySpace.com)
>>
>> Can anyone suggest some solution?
>>
>> Thanks in advance,
>>
>> Simon
>>
>> _______________________________________________
>> vwnc mailing list
>> [hidden email]
>> http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
>>
>>
>
>
> _______________________________________________
> vwnc mailing list
> [hidden email]
> http://lists.cs.uiuc.edu/mailman/listinfo/vwnc

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

mkobetic
In reply to this post by Simon Peter-2
I'm not aware of there being an issue with redirects, so my first guess would have been that if there was an issue before it would still be there. But when I try the following I get a response (from recent 7.8 build):

c := (HttpClient new)
        useSecureConnection;
        validationBlock: [:dnd | dnd CN match: 'demo.deepcovelabs.com'];
        yourself.
c executeRequest: (HttpRequest get: 'http://demo.deepcovelabs.com')

Note that I have to tell the client to useSecureConnection, otherwise it won't let me set the validationBlock:. So it seems that we might have fixed this as a side-effect of other changes. Does that look OK to you ?

"Boris Popov, DeepCove Labs"<[hidden email]> wrote:

> While we're on the subject (pun not intended), could you tell me if the
> following problem had also been addressed?
>
> When making an unsecured request via http that immediately results in a
> 302 to https address, the validation block isn't preserved on the new
> connection, so subject validation fails in the following snippet,
>
> c := (HttpClient new)
> validationBlock: [:dnd | dnd CN match: self hostName];
> yourself.
> c executeRequest: (HttpRequest get: 'http://demo.deepcovelabs.com')
>
> The problem could be narrowed down to the below method,
>
> NetProtocolInterpreter>>useSecureConnection
> self loadSecureConnection.
> connection := self sslConnectionClass new.
>
> C:\Users\Administrator>curl -i http://demo.deepcovelabs.com
> HTTP/1.0 302 Found
> Location: https://demo.deepcovelabs.com/online
> Server: BigIP
> Connection: Keep-Alive
> Content-Length: 0
>
> Thanks,
>
> -Boris

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

Boris Popov, DeepCove Labs (SNN)
Martin,

What happens when you simply do the following?

HttpClient get: 'http://demo.deepcovelabs.com'

Surely one shouldn't need to explicitly use #useSecureConnection when
any URL could end up redirecting from non-secure to secure and vice
versa? I should be able to set a validation block on any client and know
that it will be preserved during http-https redirect or any number of
transitions in fact.

Regards,

-Boris

-----Original Message-----
From: [hidden email] [mailto:[hidden email]]
Sent: Friday, January 28, 2011 4:01 PM
To: Boris Popov, DeepCove Labs
Cc: vwnc List
Subject: RE: [vwnc] [VW:7.6]SSL BadCertificate

I'm not aware of there being an issue with redirects, so my first guess
would have been that if there was an issue before it would still be
there. But when I try the following I get a response (from recent 7.8
build):

c := (HttpClient new)
        useSecureConnection;
        validationBlock: [:dnd | dnd CN match: 'demo.deepcovelabs.com'];
        yourself.
c executeRequest: (HttpRequest get: 'http://demo.deepcovelabs.com')

Note that I have to tell the client to useSecureConnection, otherwise it
won't let me set the validationBlock:. So it seems that we might have
fixed this as a side-effect of other changes. Does that look OK to you ?

"Boris Popov, DeepCove Labs"<[hidden email]> wrote:

> While we're on the subject (pun not intended), could you tell me if
> the following problem had also been addressed?
>
> When making an unsecured request via http that immediately results in
> a
> 302 to https address, the validation block isn't preserved on the new
> connection, so subject validation fails in the following snippet,
>
> c := (HttpClient new)
> validationBlock: [:dnd | dnd CN match: self hostName];
> yourself.
> c executeRequest: (HttpRequest get: 'http://demo.deepcovelabs.com')
>
> The problem could be narrowed down to the below method,
>
> NetProtocolInterpreter>>useSecureConnection
> self loadSecureConnection.
> connection := self sslConnectionClass new.
>
> C:\Users\Administrator>curl -i http://demo.deepcovelabs.com
> HTTP/1.0 302 Found
> Location: https://demo.deepcovelabs.com/online
> Server: BigIP
> Connection: Keep-Alive
> Content-Length: 0
>
> Thanks,
>
> -Boris

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

mkobetic
In reply to this post by Simon Peter-2
"Boris Popov, DeepCove Labs"<[hidden email]> wrote:
> What happens when you simply do the following?
>
> HttpClient get: 'http://demo.deepcovelabs.com'

It works but that's likely because it picks up the (now more permissive) default validation block. Which makes me wonder if what I observed also isn't just a side-effect of the new default, rather than us preserving the validation context correctly. I'll have to look into that.

> Surely one shouldn't need to explicitly use #useSecureConnection when
> any URL could end up redirecting from non-secure to secure and vice
> versa? I should be able to set a validation block on any client and know
> that it will be preserved during http-https redirect or any number of
> transitions in fact.

There are two things at play here:

1) preserving the validation context in redirects: that sounds desirable, although I'll have to ponder some more complex scenarios with cross-site redirects to be sure

2) configuring the security parameters of the client (regardless of redirects): We can certainly hide the useSecureConnection send inside the setup calls like validationBlock:, but it doesn't work that way right now. At the moment I don't know if this is how it used to work or if this is something we've just changed.

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

Boris Popov, DeepCove Labs (SNN)
Martin,

Re: new behavior, it could very well be that it works now because new
default in 7.8 accepts wildcards.

Re: validation block, from where I'm standing, I'd like to choose a
validation policy on a client (not connection) for the duration of the
whole HTTP request even if it includes multiple redirects/connections,
so being able to set it on a client without explicitly using
#useSecureConnection and having it preserved through (possible) multiple
new connections would be desirable.

Thanks,

-Boris

-----Original Message-----
From: [hidden email] [mailto:[hidden email]]
Sent: Friday, January 28, 2011 4:24 PM
To: Boris Popov, DeepCove Labs
Cc: vwnc List
Subject: RE: [vwnc] [VW:7.6]SSL BadCertificate

"Boris Popov, DeepCove Labs"<[hidden email]> wrote:
> What happens when you simply do the following?
>
> HttpClient get: 'http://demo.deepcovelabs.com'

It works but that's likely because it picks up the (now more permissive)
default validation block. Which makes me wonder if what I observed also
isn't just a side-effect of the new default, rather than us preserving
the validation context correctly. I'll have to look into that.

> Surely one shouldn't need to explicitly use #useSecureConnection when
> any URL could end up redirecting from non-secure to secure and vice
> versa? I should be able to set a validation block on any client and
> know that it will be preserved during http-https redirect or any
> number of transitions in fact.

There are two things at play here:

1) preserving the validation context in redirects: that sounds
desirable, although I'll have to ponder some more complex scenarios with
cross-site redirects to be sure

2) configuring the security parameters of the client (regardless of
redirects): We can certainly hide the useSecureConnection send inside
the setup calls like validationBlock:, but it doesn't work that way
right now. At the moment I don't know if this is how it used to work or
if this is something we've just changed.

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

mkobetic
In reply to this post by Simon Peter-2
"Boris Popov, DeepCove Labs"<[hidden email]> wrote:
> Re: validation block, from where I'm standing, I'd like to choose a
> validation policy on a client (not connection) for the duration of the
> whole HTTP request even if it includes multiple redirects/connections,
> so being able to set it on a client without explicitly using
> #useSecureConnection and having it preserved through (possible) multiple
> new connections would be desirable.

Of course, that's reasonably obvious and easy requirement. I'm thinking more about the more complex scenarios. E.g. where first link redirects to https on domaing A which then redirects to https on domain B. Is it adequate to handle this with single validationBlock ? Especially since the block doesn't have an easy indication of which part of the redirection setup it's dealing with at any given moment ? Or is this setup too artificial and we don't need to worry about it ?

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc
Reply | Threaded
Open this post in threaded view
|

Re: [VW:7.6]SSL BadCertificate

Boris Popov, DeepCove Labs (SNN)
I would tend to say that it is artificial, because most of the time
client would be invoked with a single intent and validation policy. If
one was concerned with redirect security, client could handle 302s and
make decisions in-flight.

-Boris

-----Original Message-----
From: [hidden email] [mailto:[hidden email]]
Sent: Monday, January 31, 2011 11:49 AM
To: Boris Popov, DeepCove Labs
Cc: vwnc List
Subject: RE: [vwnc] [VW:7.6]SSL BadCertificate

"Boris Popov, DeepCove Labs"<[hidden email]> wrote:
> Re: validation block, from where I'm standing, I'd like to choose a
> validation policy on a client (not connection) for the duration of the

> whole HTTP request even if it includes multiple redirects/connections,

> so being able to set it on a client without explicitly using
> #useSecureConnection and having it preserved through (possible)
> multiple new connections would be desirable.

Of course, that's reasonably obvious and easy requirement. I'm thinking
more about the more complex scenarios. E.g. where first link redirects
to https on domaing A which then redirects to https on domain B. Is it
adequate to handle this with single validationBlock ? Especially since
the block doesn't have an easy indication of which part of the
redirection setup it's dealing with at any given moment ? Or is this
setup too artificial and we don't need to worry about it ?

_______________________________________________
vwnc mailing list
[hidden email]
http://lists.cs.uiuc.edu/mailman/listinfo/vwnc