Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace polipo with an internal proxy to cache HTTPS connection #46

Open
mickours opened this issue Feb 9, 2015 · 3 comments
Open

Replace polipo with an internal proxy to cache HTTPS connection #46

mickours opened this issue Feb 9, 2015 · 3 comments

Comments

@mickours
Copy link
Contributor

mickours commented Feb 9, 2015

The Polipo proxy is only available for HTTP connection and the HTTPS connections are not cached.
Use our own cache implementation may be a good idea to add this feature, remove the polipo dependency and allows kameleon to make this cache mechanism evolve more easily.

It seems to be pretty simple to implement this in ruby:
https://gist.github.com/torsten/74107

@SalemHarrache
Copy link
Contributor

The only way to proxy (and cache) HTTPS is the MITM and it's a tlittle hard to setup it in kameleon.

@mickours
Copy link
Contributor Author

mickours commented Dec 4, 2015

Yes, I agree this is not easy. Maybe this can be replace by good practice like:

  • setting exact git commit of all built software
  • setting exact package version in classical package dependencies. (pip, gem, deb, rpm,... )

This can be done for home built packages and software but for all dependencies and runtime this is not common nor easy to do.

I think the only way to do it properly is a kind of MITM to catch anything that come from the network.
But you're right this not easy and it might require a complete tool by itself.

@SalemHarrache
Copy link
Contributor

I think the only way to do it properly is a kind of MITM to catch anything that come from the network.
But you're right this not easy and it might require a complete tool by itself.

HTTPS is designed to prevent man-in-the middle attacks, and a transparent proxy is effectively a MITM.

If we want to cache HTTPS, we need to generate and inject the proxy certificate
in every context (local/in/out) so that the clients (wget, etc.) can trust
the proxy (MITM).

You can find an example here with squid and more information about Ssl Bump here.

Another way to achieve that is to make clients (wget --no-check-certificate ...) ignore the SSL certificat checks for all HTTPS connections, but that's not really ideal neither...

Anyway, it won't be with a script of ours that we can make a proxy with such features.
Even polipo does not offer persistent cache for HTTPS (with SSL Bump), it just opens
a tunnel (http://www.pps.univ-paris-diderot.fr/~jch/software/polipo/manual/Tunnelling-connections.html)

Yes, I agree this is not easy. Maybe this can be replace by good practice like:

  • setting exact git commit of all built software
  • setting exact package version in classical package dependencies. (pip, gem, deb, rpm,... )

A simple workaround is to only use a cachable content when you need to make your experience (recipe) reproductible. At the end avoid HTTPS as much as possible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants