• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Dansguardian package for 2.0

pfSense Packages
51
492
465.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D
    dig1234
    last edited by Mar 9, 2012, 6:54 PM

    @Cino:

    still have a lot more testing with SSL man-in-middle but when I try to access https sites, i'm getting the danguardian denied page "Certificate supplied by server was not valid"

    still have to check logs and read the docs from danguardian site on this feature.

    I am at the same point with ssl mitm. I found in the dansguardianf1.conf file there are two options:
    one for mitm (sslmitm = on) and one for cert checking (sslcertcheck = off), however even with cert checking off, I'm still getting that message:
    "Certificate supplied by server was not valid"
    So either that option is not sticking or I'm missing something. I had a thought of actually feeding the cert checking function with all the trusted root certs from a popular browser. According to dansguardian.conf they should be placed in '/etc/ssl/certs/' though I'm not sure what format or exactly how to batch export them all… Thoughts?

    1 Reply Last reply Reply Quote 0
    • M
      marcelloc
      last edited by Mar 9, 2012, 6:56 PM

      @dig1234:

      I am at the same point with ssl mitm. I found in the dansguardianf1.conf file there are two options:
      one for mitm (sslmitm = on) and one for cert checking (sslcertcheck = off), however even with cert checking off, I'm still getting that message:
      "Certificate supplied by server was not valid"

      Are you sure you deselected sslmint option(CTRL+CLICK)?
      Every time I test dansguardian package, I can enable and disable this option via gui.

      Treinamentos de Elite: http://sys-squad.com

      Help a community developer! ;D

      1 Reply Last reply Reply Quote 0
      • D
        dig1234
        last edited by Mar 9, 2012, 7:24 PM

        @marcelloc:

        @dig1234:

        I am at the same point with ssl mitm. I found in the dansguardianf1.conf file there are two options:
        one for mitm (sslmitm = on) and one for cert checking (sslcertcheck = off), however even with cert checking off, I'm still getting that message:
        "Certificate supplied by server was not valid"

        Are you sure you deselected sslmint option(CTRL+CLICK)?
        Every time I test dansguardian package, I can enable and disable this option via gui.

        Yes toggling mitm works. Its the cert checking that won't disable. Even through the conf file.

        1 Reply Last reply Reply Quote 0
        • M
          marcelloc
          last edited by Mar 9, 2012, 10:03 PM

          Can you check on dansguardianfx.conf if this option is set on on all groups you have?

          At my setup it changes from on/off without issues.

          Treinamentos de Elite: http://sys-squad.com

          Help a community developer! ;D

          1 Reply Last reply Reply Quote 0
          • D
            dig1234
            last edited by Mar 9, 2012, 10:15 PM

            I should have been more clear, it toggles on and off in the conf file without issue. But once I enable mitm it apparently automatically enables cert checking Even though the conf file still says certcheck=off. I'm assuming this is the reason we are getting that invalid server cert error.
            Maybe dansguardian has a built in dependency when you enable mitm you get cert checking. This makes sense because the user/browser can no longer check the authenticity of the original cert since we are only presenting him with a forged cert. The solution would be (as I see it) to fill the /etc/ssl/certs/ with a repository of the valid Root CAs on the internet and let the cert checking do its job.. That should clear the error.
            @marcelloc:

            Can you check on dansguardianfx.conf if this option is set on on all groups you have?

            At my setup it changes from on/off without issues.

            1 Reply Last reply Reply Quote 0
            • D
              dig1234
              last edited by Mar 12, 2012, 1:28 AM

              Ok this appears to have worked. I no longer get the "Certificate supplied by server was not valid". However I now get a 404. It appears to be trying to use some sort of redirecting cgi that we don't have in the package yet?
              Now when trying to go to https://mail.google.com it redirects to a url: http://PFSENSE_ip/modules/guardian/cgi-bin/mitm.cgi?https://mail.google.com/mail/?tab=wm which triggers a 404.
              Bottom line I think I'm one step closer to working mitm…

              Here's what I did (maybe someone can suggest a cleaner route, I'm pretty new to this..)
              -Ran a live ubuntu iso in virtualbox
              -Grabbed the folder /etc/ssl/certs (which is a bunch of symlinks to the mozilla folder)
              -Grabbed the folder /usr/share/ca-certificates/mozilla
              -dumped them in same locations on pfsense
              -violla certs now pass dansguardian inspection

              Next step find the missing cgi and drop in www path?

              1 Reply Last reply Reply Quote 0
              • M
                marcelloc
                last edited by Mar 12, 2012, 2:45 AM

                It steps on mitm cert verify and on ssl filter?

                If so, this is really a GOOD news!  :D

                Treinamentos de Elite: http://sys-squad.com

                Help a community developer! ;D

                1 Reply Last reply Reply Quote 0
                • D
                  dig1234
                  last edited by Mar 12, 2012, 3:07 AM

                  Yes with mitm ON and cert check ON! Try it you'll get a 404 now..
                  If there's a way to post the tar's of the cert folders, I would but I'm not sure if that's allowed?

                  @marcelloc:

                  It steps on mitm cert verify and on ssl filter?

                  If so, this is really a GOOD news!  :D

                  1 Reply Last reply Reply Quote 0
                  • M
                    marcelloc
                    last edited by Mar 12, 2012, 4:44 AM Mar 12, 2012, 3:11 AM

                    Send a link to me on private Message.

                    If it is the same certs Every browser has to check sites, I think there is no problem.

                    EDIT

                    Are these the certs you did install?

                    http://www.FreeBSD.org/cgi/ports.cgi?query=Cert&stype=all&sektion=security

                    Port description for security/ca_root_nss

                    Root certificates from certificate authorities included in the Mozilla
                    NSS library and thus in Firefox and Thunderbird.

                    This port directly tracks the version of NSS in the security/nss port.

                    Can you try to install this package and see if you get the same result?

                    amd64
                    http://e-sac.siteseguro.ws/packages/amd64/8/All/ca_root_nss-3.13.2.tbz

                    i386
                    http://e-sac.siteseguro.ws/packages/8/All/ca_root_nss-3.13.2.tbz

                    This package install /usr/local/share/certs/ca-root-nss.crt and a symlink to /etc/ssl/cert.pem

                    Treinamentos de Elite: http://sys-squad.com

                    Help a community developer! ;D

                    1 Reply Last reply Reply Quote 0
                    • D
                      dig1234
                      last edited by Mar 12, 2012, 4:45 AM

                      Sent. That looks cool, if that could be incorporated into the package along with the missing cgi we may be in business.

                      @marcelloc:

                      Send a link to me on private Message.

                      If it is the same certs Every browser has to check sites, I think there is no problem.

                      EDIT

                      Are these the certs you did install?

                      http://www.FreeBSD.org/cgi/ports.cgi?query=Cert&stype=all&sektion=security

                      Port description for security/ca_root_nss

                      Root certificates from certificate authorities included in the Mozilla
                      NSS library and thus in Firefox and Thunderbird.

                      This port directly tracks the version of NSS in the security/nss port.

                      Can you try to install this package and see if you get the same result?

                      amd64
                      http://e-sac.siteseguro.ws/packages/amd64/8/All/ca_root_nss-3.13.2.tbz

                      i386
                      http://e-sac.siteseguro.ws/packages/8/All/ca_root_nss-3.13.2.tbz

                      This package install /usr/local/share/certs/ca-root-nss.crt and a symlink to /etc/ssl/cert.pem

                      1 Reply Last reply Reply Quote 0
                      • M
                        marcelloc
                        last edited by Mar 12, 2012, 5:22 AM

                        The certs looks the same on both.

                        On freebsd/pfsense the package installs a unique file with all certs with info and on your tar It's a file for each ca.

                        I'm getting the same result here. with or without cert check enabled I can see all ssl sites not in blacklist.

                        But when I enable ssl mitm log show all ssl as

                        DENIED Certificate supplied by server was not valid: unable to get local issuer certificate CONNECT 0 0 SSL Site 1 200 -  Default

                        Tried to copy pfsense created ca to /etc/ssl/certs/ with no success.

                        If you can test this, edit /usr/local/pkg/dansguardian.conf.template file to fix sslcertificatepath from pfsense ca-root package
                        #SSL certificate checking path
                        #Path to CA certificates used to validate the certificates of https sites.
                        sslcertificatepath = '/etc/ssl/certs/'

                        After this file edit, apply conf on dansguardian gui.

                        att,
                        Marcello Coutinho

                        Treinamentos de Elite: http://sys-squad.com

                        Help a community developer! ;D

                        1 Reply Last reply Reply Quote 0
                        • D
                          dig1234
                          last edited by Mar 12, 2012, 5:05 PM Mar 12, 2012, 5:01 PM

                          You also need to have symlinks to each of the pem files. The name of symlink will be the computed hash of the cert. Without the properly named symlinks, dansguardian will not see the pem files.
                          See this site for a script to create a correct symlink: http://wiki.openwrt.org/doc/howto/wget-ssl-certs

                          Or if you use the tars I sent they already have all the symlinks setup just do tar -xzf for both folders.

                          @marcelloc:

                          The certs looks the same on both.

                          On freebsd/pfsense the package installs a unique file with all certs with info and on your tar It's a file for each ca.

                          I'm getting the same result here. with or without cert check enabled I can see all ssl sites not in blacklist.

                          But when I enable ssl mitm log show all ssl as

                          DENIED Certificate supplied by server was not valid: unable to get local issuer certificate CONNECT 0 0 SSL Site 1 200 -  Default

                          Tried to copy pfsense created ca to /etc/ssl/certs/ with no success.

                          If you can test this, edit /usr/local/pkg/dansguardian.conf.template file to fix sslcertificatepath from pfsense ca-root package
                          #SSL certificate checking path
                          #Path to CA certificates used to validate the certificates of https sites.
                          sslcertificatepath = '/etc/ssl/certs/'

                          After this file edit, apply conf on dansguardian gui.

                          att,
                          Marcello Coutinho

                          1 Reply Last reply Reply Quote 0
                          • M
                            marcelloc
                            last edited by Mar 12, 2012, 6:45 PM

                            No luck.  :(

                            using tar or using ca-root package and linking pfsense ca created I always get the same error.

                            using only cert check, all https that is not on blacklists goes with no erros
                            using ssl mitm every https that is not on whitelist fails with

                            The only thing that changed is that the error now says:
                            DENIED Failed to negotiate ssl connection to client CONNECT 0 0 SSL Site 1 200

                            I did removed all certs, including ca-root package and folders.

                            I'll keep trying to identify how to reach each error.

                            Treinamentos de Elite: http://sys-squad.com

                            Help a community developer! ;D

                            1 Reply Last reply Reply Quote 0
                            • D
                              dig1234
                              last edited by Mar 13, 2012, 4:57 AM

                              Your symlinks are probably not working. You should have in the /etc/ssl/certs folder about 180 symlinks that look like similar to these:
                              f060240e.0
                              f081611a.0
                              f15719eb.0
                              f3377b1b.0
                              f387163d.0
                              f39fc864.0
                              f4996e82.0

                              If you cat one of them you should see a certificate pem file.
                              This has nothing to do with the generated pfsense CA certificate. This is for dansguardian to verify the CA's on the genuine certs it's receiving from websites.  It uses the symlinks to quickly locate the correct CA cert.
                              That's what cert checking does it checks the website cert against a repository of vaild public CA certs. What's interesting is that dansguardian apparently always does the cert checking if mitm is ON.

                              I wonder how we can get that cgi, from the source code it appears to be doing some cookie work. The file mitm.cgi does not appear in the dansguardian-2.12.0.0.tar.gz tarball is that what you're working with?

                              1 Reply Last reply Reply Quote 0
                              • M
                                marcelloc
                                last edited by Mar 13, 2012, 5:25 AM Mar 13, 2012, 5:21 AM

                                I could not reproduce this file call, just errors or ssl sites normal access.

                                Try to copy error template to this cgi script.

                                The base folder is /usr/local/www

                                I'll commit latest package code with some fixes I did.

                                Treinamentos de Elite: http://sys-squad.com

                                Help a community developer! ;D

                                1 Reply Last reply Reply Quote 0
                                • M
                                  mkaishar
                                  last edited by Mar 15, 2012, 8:11 PM

                                  dumb question…but how do i install this package? i am on 2.0.1 amd64 iso

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    marcelloc
                                    last edited by Mar 15, 2012, 8:46 PM

                                    It's on system -> packages  :)

                                    Treinamentos de Elite: http://sys-squad.com

                                    Help a community developer! ;D

                                    1 Reply Last reply Reply Quote 0
                                    • M
                                      marcelloc
                                      last edited by Mar 15, 2012, 9:54 PM

                                      Version 0.1.5 is out with some fixes and LDAP group based access lists.

                                      • Create group acl based on LDAP group name you want to filter

                                      • Define userlist frequency update

                                      • Apply ldap config

                                      Treinamentos de Elite: http://sys-squad.com

                                      Help a community developer! ;D

                                      1 Reply Last reply Reply Quote 0
                                      • A
                                        asterix
                                        last edited by Mar 20, 2012, 6:35 PM

                                        How do I see the logs and reports of whats blocked and what was searched from my network?

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          marcelloc
                                          last edited by Mar 20, 2012, 7:12 PM

                                          The dansguardian log file is /var/log/dansguardian/access.log

                                          The sarg package will do it on gui but only when dansguardian report is set to squid format.

                                          Treinamentos de Elite: http://sys-squad.com

                                          Help a community developer! ;D

                                          1 Reply Last reply Reply Quote 0
                                          117 out of 492
                                          • First post
                                            117/492
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.