Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Squid gone now what

    Scheduled Pinned Locked Moved General pfSense Questions
    17 Posts 5 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      Mmm, DNS blocking has worked well for me for some years now. Squid has almost always been more trouble than it's worth IMO.

      M 2 Replies Last reply Reply Quote 1
      • S
        SteveITS Galactic Empire @michmoor
        last edited by

        @michmoor You could probably NAT some clients to specific DNS servers. Like this but out to Quad9 or whatever, or vice versa:
        https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote ๐Ÿ‘ helpful posts!

        1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @stephenw10
          last edited by

          @stephenw10 said in Squid gone now what:

          DNS blocking has worked well for me for some years now.

          Whats your strategy of doing per-user or per-vlan dns blocking? A common scenario i see on Reddit are people who want to do filtering on a Kids_VLAN.

          @SteveITS said in Squid gone now what:

          You could probably NAT some clients to specific DNS servers

          Thats actually a really good idea Steve, i cant believe i didnt think about it. Certain devices could get redirected to a DNS server of my choice.....Huh..why am i now thinking of interesting possibilities here? hehe

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 0
          • M
            michmoor LAYER 8 Rebel Alliance @stephenw10
            last edited by

            @stephenw10 said in Squid gone now what:

            Squid has almost always been more trouble than it's worth IMO.

            You're not a fan of websites that stopped working and browser updates breaking proxy configs? Those were fun.
            I shall miss them.....

            Firewall: NetGate,Palo Alto-VM,Juniper SRX
            Routing: Juniper, Arista, Cisco
            Switching: Juniper, Arista, Cisco
            Wireless: Unifi, Aruba IAP
            JNCIP,CCNP Enterprise

            1 Reply Last reply Reply Quote 1
            • JonathanLeeJ
              JonathanLee
              last edited by JonathanLee

              Maybe run OpenSense on your equipment that way you get proxy use back. That firewall has https web proxy software, plus it's a fork of PfSense. QUIC https3 DoH, DNS based filtering has a number of issues also.

              Or have an external Proxy server that runs Squid still, Squid's next update is in 2025.

              Make sure to upvote

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Though they are also running Squid and even the latest version still has known security issues.

                M 1 Reply Last reply Reply Quote 1
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by

                  @stephenw10
                  correct on this. There is no where to run metaphorically speaking. Iโ€™d imagine the opnsense dev team will make the choice to drop the package as well.
                  Enterprise security vendors Iโ€™d imagine also run some version of squid but they are a black box and highly customized so they may not have the same concerns.
                  That being the case if you really want some forward proxy in your setup you have to look at proprietary security vendor appliances but those have a much higher TCO.

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  M 1 Reply Last reply Reply Quote 0
                  • M
                    mcury @michmoor
                    last edited by

                    As I see it, pfblockerNG is almost there.
                    You can block everything you want, what lacks for me is the possibility to have different policies for different groups.

                    It would be nice to see an implementation such as you could associate users IP addresses with different block lists/groups.

                    That would be perfect, but I don't know if that is feasible taking in consideration the coding behind it.

                    dead on arrival, nowhere to be found.

                    stephenw10S 1 Reply Last reply Reply Quote 1
                    • JonathanLeeJ
                      JonathanLee
                      last edited by JonathanLee

                      I purchased my SG-2100 to learn about Proxy use with SSL intercept and certificates. It took for ever, from 2019 on to get it to work correctly. I actually paid for this with us dollars. Unreal, it was advertised as a fictional item had so many issues. I have the air let out of my tires right now. I paided for this. Unreal. Some users downloaded this stuff for free, I am a paid user, that had all these issues from the get go and now the packages are depreciated after it started working correctly. It's sad. DNS versions don't work, they bypass the DNS with DoH or https3 dns. It has many issues too.

                      Just frustrated.
                      It's alright it was for educational purposes. And I learned a lot about proxies. Thank you for all you do.

                      Make sure to upvote

                      M S 2 Replies Last reply Reply Quote 0
                      • M
                        michmoor LAYER 8 Rebel Alliance @JonathanLee
                        last edited by

                        @JonathanLee
                        I understand your frustration completely.
                        I would've preferred a drop-in replacement if available.
                        Its still being advertised weirdly enough - https://www.netgate.com/pfsense-plus-applications/content-filtering

                        This does effectively removes the ability to provide any per-user filtering on the platform null. If you really need it (and there are plenty of valid reasons to need it) you will need to explore other vendors.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        M 1 Reply Last reply Reply Quote 1
                        • M
                          michmoor LAYER 8 Rebel Alliance @michmoor
                          last edited by michmoor

                          Good feedback here:
                          https://forum.opnsense.org/index.php?topic=36914.msg180743#msg180743

                          IMO, this is a better way of handling the Squid vuln issue. Still make it available but provide clear and proper warning during install.
                          There are still many valid use cases for Squid when running a network. How do i know? Because its still being advertised on Netgates site - https://www.netgate.com/pfsense-plus-applications/content-filtering

                          So for all the reasons listed on the website is all the reasons Squid should be made available in the repo.
                          Just provide proper notice when installing it and also issue a warning banner similar to what the ISC to KEA warning banner is doing.

                          Firewall: NetGate,Palo Alto-VM,Juniper SRX
                          Routing: Juniper, Arista, Cisco
                          Switching: Juniper, Arista, Cisco
                          Wireless: Unifi, Aruba IAP
                          JNCIP,CCNP Enterprise

                          JonathanLeeJ 1 Reply Last reply Reply Quote 2
                          • stephenw10S
                            stephenw10 Netgate Administrator @mcury
                            last edited by

                            @mcury Yes. That should be possible using views in Unbound ๐Ÿค” Though I'm not sure what implications that might have for memory use etc.

                            1 Reply Last reply Reply Quote 1
                            • JonathanLeeJ
                              JonathanLee @michmoor
                              last edited by

                              @michmoor YES!!! Clear warning to end users and still have available PLEASE!!!!

                              Make sure to upvote

                              1 Reply Last reply Reply Quote 2
                              • S
                                SteveITS Galactic Empire @JonathanLee
                                last edited by

                                @JonathanLee said in Squid gone now what:

                                DNS versions don't work, they bypass the DNS with DoH or https3 dns

                                Long/detailed doc on how to block those:
                                https://jpgpi250.github.io/piholemanual/doc/Block%20DOH%20with%20pfsense.pdf
                                from:
                                https://jpgpi250.github.io/piholemanual/

                                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                Upvote ๐Ÿ‘ helpful posts!

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.