Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Patches update

    Scheduled Pinned Locked Moved Development
    patchsystempatches
    13 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @JonathanLee
      last edited by

      @JonathanLee you using an external redirect ?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      JonathanLeeJ 1 Reply Last reply Reply Quote 0
      • JonathanLeeJ
        JonathanLee @michmoor
        last edited by

        @michmoor only Squidguard

        Make sure to upvote

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @JonathanLee
          last edited by

          @JonathanLee so you are redirecting to pfsense then?

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          JonathanLeeJ 1 Reply Last reply Reply Quote 0
          • JonathanLeeJ
            JonathanLee @michmoor
            last edited by

            @michmoor there is a built in redirecter for blocked urls that is in Squidguard. It's inside of pfSense

            Make sure to upvote

            M 1 Reply Last reply Reply Quote 1
            • M
              michmoor LAYER 8 Rebel Alliance @JonathanLee
              last edited by michmoor

              @JonathanLee Ive been using the 'ext url found (enter URL) option. I have an instance of Apache stood up

              What option are you using? Im asking because if you select internal then pfsense serves the page but you need to allow access to the management port (443) which isnt a good option .

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • M
                mcury
                last edited by

                As far as I remember, those redirects always worked.
                But they won't work for HTTPS since the domain blocked does not match the certificate presented by squidguard, thus the browser will prompt that error.

                dead on arrival, nowhere to be found.

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @mcury
                  last edited by michmoor

                  @mcury
                  If you use an external redirect which is what i do then http or https blocks dont matter as its being sent to my web server which is listening on port 80.
                  I just didnt want a dependency on something outside the pfsense box but its the only preferrable solution i can think of.

                  So for exampleanything matching my squidguard block gets sent to http://netadmin/info.php?url=403&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u

                  netadmin = locally hosted web server

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    mcury @michmoor
                    last edited by

                    @michmoor said in Patches update:

                    If you use an external redirect which is what i do then http or https blocks dont matter as its being sent to my web server which is listening on port 80.
                    I just didnt want a dependency on something outside the pfsense box but its the only preferrable solution i can think of.

                    I don't see how a browser would allow that without showing a certificate error.
                    If you request a https URL, the browser is expecting the domain to match with the certificate, this is how SSL works.
                    Did you disable something in the browser for that to work ?

                    Are you using bump or splice option ?

                    dead on arrival, nowhere to be found.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @mcury
                      last edited by michmoor

                      @mcury It works.
                      I am blocking .pdfs as a test.

                      Setting:

                      0626dbe9-78da-49e9-982e-83634c3e5213-image.png

                      Block
                      4f25500f-0023-4f6a-9753-cf5d55108d17-image.png

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      M 1 Reply Last reply Reply Quote 2
                      • M
                        mcury @michmoor
                        last edited by

                        @michmoor Hm, so you are using Squid-in-the-middle SSL, bump SSL, mimicking the SSL on the demand.. Imported the certificate to the hosts. Ok then, thanks @michmoor.

                        dead on arrival, nowhere to be found.

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          michmoor LAYER 8 Rebel Alliance @mcury
                          last edited by

                          @mcury Yep. Sorry if that wasnt clear.
                          I am doing full MITM.

                          If you rely only on the internal redirect then pfsense points back to itself on the management port (firewall.example.com:443) .
                          The problem of course is that in order to serve the page you must make your management port accessible to all LAN clients. That means making management accessible to all LAN clients. The only workaround is to use an external webserver that has php code on it to interrupt whats being sent to it from pfsense

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          M 1 Reply Last reply Reply Quote 0
                          • M
                            mcury @michmoor
                            last edited by

                            @michmoor said in Patches update:

                            Yep. Sorry if that wasnt clear.
                            I am doing full MITM.

                            Np, I was just trying to understand :)

                            @michmoor said in Patches update:

                            If you rely only on the internal redirect then pfsense points back to itself on the management port (firewall.example.com:443) .
                            The problem of course is that in order to serve the page you must make your management port accessible to all LAN clients. That means making management accessible to all LAN clients. The only workaround is to use an external webserver that has php code on it to interrupt whats being sent to it from pfsense

                            Now I see what you meant, yes, indeed that would be a problem.. Using an external server for that solves this problem.

                            dead on arrival, nowhere to be found.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.