SSL Proxy... double proxy.... Will it work?

Posted on 2011-03-01
Last Modified: 2012-05-11
Hi all.

This is the question I have.  If you have a double ssl proxy will it work?  So you are faking a fake certificate basically. In theory, I think it should work.  In reality.. well that is often a different thing.

Your thoughts?
Question by:NYGiantsFan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
LVL 33

Accepted Solution

Dave Howe earned 500 total points
ID: 35009580
depends on what you mean by a "double proxy"

If you are acting as a classic proxy, then you will be forwarding (unchanged) the ssl handshake you get from upstream, and it doesn't matter too much how many proxies that goes though.

If you are intercept-proxying a ssl connection then you have to be able to represent to the end user (either by having a locally installed cert for reverse proxies such as ISA server and iChain, or spoofing the certificate "on the fly" like, for example, ironport WSAs) a certificate they will accept as valid for the url they entered.

If there is another proxy upstream of type classic, then it doesn't matter - you are planning to either pass though or spoof the certificate anyhow.

If there is another proxy of the intercept type upstream, then it gets a bit more interesting. The certificate must be acceptable where used, either at the end client (for a pass though proxy) or on the intercept proxy itself (if the chain has TWO intercept proxies in it, the first must accept the second's certificate)

this is usually the case (In fact, most intercept proxies don't actually care if their upstream validates or not) but there is an edge case where the first proxy's cert would be acceptable to the end user (via group policy or whatever) but is *not* acceptable to the second proxy, and hence that proxy generates an error to the user rather than passing though the traffic.
LVL 33

Expert Comment

by:Dave Howe
ID: 35009588
note that most proxies (of either type) can be configured to forward some or all requests explicitly to another proxy, or query the cached data on other proxies for already-downloaded content, or both :)

Author Closing Comment

ID: 35010023
That is what I thought.  Thanks for the confirmation Dave.
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

ID: 35010279
Let me clarify in my mind.

For theory sake....

We take one blue coat ssl intercept then we place another blue coat intercept next to it logically.  

Assumptions: 1. That a root CA has been trusted by the end user.  2.  That both Blue Coat devices have an intermediate trusted CA.

We should  not have problems capturing the decrypted traffic twice, because the end user will never see a difference.

Thanks again for you assistance Dave.

LVL 33

Expert Comment

by:Dave Howe
ID: 35010669
if one bluecoat is "upstream" of the other, then the second bluecoat may well alert if you have not added the CA key for the first bluecoat to it.

however, given you own both bluecoats and the setup procedure pretty much requires that you use an external root CA (usually a MS one, although I have used xca for this in the past) they probably have the same root CA onboard anyhow, so it becomes academic :)

Author Comment

ID: 35010849
How about this situation:
Each blue coat has a self generated CA certificate.  End user has had both certificates pushed out.  Then the two blue coats will have no problem with the others certificate. (Actually, I think you will need to use a MS CA because how will the two blue trust each others certificate?)

So user connects to blue coat 1.  Blue coat 1 decrypts then re-encrypts traffic and creates on the fly certificate which is sent to Blue Coat 2.  Blue Coat accepts blue coat 1 certificate then creates another certificate to connect to the website.  (actually, I think it is more complex then this...however this is the basic logic)

Is this practical..

LVL 33

Expert Comment

by:Dave Howe
ID: 35012022
sounds about right. assuming 1 is closer to the user than 2, then what will happen is that the user will connect to 1 and ask for the url; 1 will connect to 2, and again, ask for the url, and 2 will connect to the website. the site will respond with a certificate, which 2 will fake a copy off and pass to 1, and 1 will fake a copy off and pass back to the user. both bluecoat devices will then do analysis - which is really a bit of a waste, but if you want to do that it will work :)

Author Comment

ID: 35017124
I just picked two blue coat devices for theory.  I am actually interested in dropping another SSL proxy, however I have greater familiarity with Blue Coat.  

Dave, you have helped me out a few time in the past.  If you are ever in DC, I will buy you lunch if you are interested.  Thanks again!

LVL 33

Expert Comment

by:Dave Howe
ID: 35019054
lol, based in the Uk, that's a long way to go for some munchies, but I appreciate the thought :)

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question