Open Arno0x opened 8 years ago
Wow, thanks for your report ! It is really appreciated !
Second test: Corporate proxy with NTLM authentication of domain authenticated users.
Were you running the Windows binaries for this test ? NTLM auth on Linux is not implemented in 2.2.0. It is an enhancement that we would like to add in a future version.
Third test:
Hmm, hard to tell what can be wrong. If the proxy tries to MITM the connection, the connection will fail since the client is doing a mutual TLS authentication.
Maybe the debug log level (-v debug
) can help us to determine where the TLS negotiation is failing.
Anyway, thanks for giving us some time to make this project better !
Hi,
I'm back with my attempts to make SSFC work through a corporate proxy.
First test: Simple forward proxy with no authentication and no SSL interception (tinyproxy): everything works like a charm, no problem.
Second test: Corporate proxy with NTLM authentication of domain authenticated users. I've tried all possible combination of the "Credentials" section in the config file:
Third test: Still using the same corporate proxy, but this time, I'm handling the NTLM authentication to an intermediate local proxy (cntlm). This time, the authenticating phase passes and I can see the SSL handshake starting (in wireshark), but then I get the following error message from ssfc:
From a network perspective, I see a RST packet from the upstream (corporate) proxy. It might be related to the fact the corporated proxy does some SSL inspection, or it does not support the SSL/TLS parameters negociated by ssfc.
I'm afraid this post is not very useful in identifying where the bug lies. I'll update the issue if I find something new.
Arno