Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Squidguard-squid3 systempatch for use with squid3-dev

    Scheduled Pinned Locked Moved Cache/Proxy
    59 Posts 11 Posters 47.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      webstor
      last edited by

      could you post your squid.conf please?

      1 Reply Last reply Reply Quote 0
      • A
        aGeekhere
        last edited by

        Are you using squidGuard-squid3 ? how do i find the squid.conf file

        Never Fear, A Geek is Here!

        1 Reply Last reply Reply Quote 0
        • W
          webstor
          last edited by

          Yes, squid3-dev. The squid.conf is under Diagnostic / edit File/  browse to /usr/pbi/squid-amd64 or squid-i386 /etc / squid / squid.conf

          1 Reply Last reply Reply Quote 0
          • A
            aGeekhere
            last edited by

            Ok here is my squid config, Any reason why I get an 80072F8F error in windows update.

            
            # This file is automatically generated by pfSense
            # Do not edit manually !
            
            http_port 192.168.1.1:3128 ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/pbi/squid-i386/etc/squid/serverkey.pem capath=/usr/pbi/squid-i386/share/certs/
            
            http_port 127.0.0.1:3128 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/pbi/squid-i386/etc/squid/serverkey.pem capath=/usr/pbi/squid-i386/share/certs/
            
            https_port 127.0.0.1:3127 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/pbi/squid-i386/etc/squid/serverkey.pem capath=/usr/pbi/squid-i386/share/certs/
            
            icp_port 0
            dns_v4_first on
            pid_filename /var/run/squid.pid
            cache_effective_user proxy
            cache_effective_group proxy
            error_default_language en
            icon_directory /usr/pbi/squid-i386/etc/squid/icons
            visible_hostname localhost
            cache_mgr admin@localhost
            access_log /dev/null
            cache_log /var/squid/logs/cache.log
            cache_store_log none
            netdb_filename /var/squid/logs/netdb.state
            pinger_enable on
            pinger_program /usr/pbi/squid-i386/libexec/squid/pinger
            sslcrtd_program /usr/pbi/squid-i386/libexec/squid/ssl_crtd -s /var/squid/lib/ssl_db -M 4MB -b 2048
            sslcrtd_children 5
            sslproxy_capath /usr/pbi/squid-i386/share/certs/
            sslproxy_cert_error allow all
            sslproxy_cert_adapt setValidBefore all
            
            logfile_rotate 1
            debug_options rotate=1
            shutdown_lifetime 3 seconds
            # Allow local network(s) on interface(s)
            acl localnet src  192.168.1.0/24
            forwarded_for off
            uri_whitespace strip
            
            # Break HTTP standard for flash videos. Keep them in cache even if asked not to.
            refresh_pattern -i \.flv$ 10080 90% 999999 ignore-no-cache override-expire ignore-private
            
            # Let the clients favorite video site through with full caching
            acl youtube dstdomain .youtube.com
            cache allow youtube
            
            # Windows Update refresh_pattern
            range_offset_limit -1
            refresh_pattern -i microsoft.com/.*\.(cab|exe|ms[i|u|f]|asf|wm[v|a]|dat|zip) 4320 80% 43200 reload-into-ims
            refresh_pattern -i windowsupdate.com/.*\.(cab|exe|ms[i|u|f]|asf|wm[v|a]|dat|zip) 4320 80% 43200 reload-into-ims
            refresh_pattern -i windows.com/.*\.(cab|exe|ms[i|u|f]|asf|wm[v|a]|dat|zip) 4320 80% 43200 reload-into-ims
            
            # Symantec refresh_pattern
            range_offset_limit -1
            refresh_pattern liveupdate.symantecliveupdate.com/.*\.(cab|exe|dll|msi) 10080 100% 43200 reload-into-ims
            refresh_pattern symantecliveupdate.com/.*\.(cab|exe|dll|msi) 10080 100% 43200 reload-into-ims
            
            # Avast refresh_pattern
            range_offset_limit -1
            refresh_pattern avast.com/.*\.(vpu|cab|stamp|exe) 10080 100% 43200 reload-into-ims
            
            # Avira refresh_pattern
            range_offset_limit -1
            refresh_pattern personal.avira-update.com/.*\.(cab|exe|dll|msi|gz) 10080 100% 43200 reload-into-ims
            
            cache_mem 1000 MB
            maximum_object_size_in_memory 1000000 KB
            memory_replacement_policy heap LFUDA
            cache_replacement_policy heap LFUDA
            cache_dir ufs /var/squid/cache 15000 32 256
            minimum_object_size 0 KB
            maximum_object_size 10000000 KB
            offline_mode off
            cache_swap_low 90
            cache_swap_high 95
            cache allow all
            
            # Add any of your own refresh_pattern entries above these.
            refresh_pattern ^ftp:    1440  20%  10080
            refresh_pattern ^gopher:  1440  0%  1440
            refresh_pattern -i (/cgi-bin/|\?) 0  0%  0
            refresh_pattern .    0  20%  4320
            
            # No redirector configured
            
            #Remote proxies
            
            # Setup some default acls
            # From 3.2 further configuration cleanups have been done to make things easier and safer. The manager, localhost, and to_localhost ACL definitions are now built-in.
            # acl localhost src 127.0.0.1/32
            acl allsrc src all
            acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901  3128 3127 1025-65535 
            acl sslports port 443 563  
            
            # From 3.2 further configuration cleanups have been done to make things easier and safer. The manager, localhost, and to_localhost ACL definitions are now built-in.
            #acl manager proto cache_object
            
            acl purge method PURGE
            acl connect method CONNECT
            
            # Define protocols used for redirects
            acl HTTP proto HTTP
            acl HTTPS proto HTTPS
            acl allowed_subnets src 192.168.1.1/24
            acl whitelist dstdom_regex -i "/var/squid/acl/whitelist.acl"
            http_access allow manager localhost
            
            http_access deny manager
            http_access allow purge localhost
            http_access deny purge
            http_access deny !safeports
            http_access deny CONNECT !sslports
            
            # Always allow localhost connections
            # From 3.2 further configuration cleanups have been done to make things easier and safer. 
            # The manager, localhost, and to_localhost ACL definitions are now built-in.
            # http_access allow localhost
            
            quick_abort_min -1 KB
            quick_abort_max 0 KB
            request_body_max_size 0 KB
            delay_pools 1
            delay_class 1 2
            delay_parameters 1 -1/-1 -1/-1
            delay_initial_bucket_level 100
            # Throttle extensions matched in the url
            acl throttle_exts urlpath_regex -i "/var/squid/acl/throttle_exts.acl"
            delay_access 1 allow throttle_exts
            delay_access 1 deny allsrc
            
            # Reverse Proxy settings
            
            always_direct allow whitelist
            ssl_bump none whitelist
            # Package Integration
            url_rewrite_program /usr/pbi/squidguard-squid3-i386/bin/squidGuard -c /usr/pbi/squidguard-squid3-i386/etc/squidGuard/squidGuard.conf
            url_rewrite_bypass off
            url_rewrite_children 5
            
            # Custom options before auth
            acl WindowsUpdate dstdomain windowsupdate.microsoft.com
            acl WindowsUpdate dstdomain update.microsoft.com
            acl WindowsUpdate dstdomain activex.microsoft.com
            acl WindowsUpdate dstdomain download.windowsupdate.com
            acl WindowsUpdate dstdomain codecs.microsoft.com
            acl WindowsUpdate dstdomain stats.updates.microsoft.com
            acl WindowsUpdate dstdomain c.microsoft.com
            no_cache deny WindowsUpdate
            http_access allow WindowsUpdate
            
            always_direct allow all
            ssl_bump server-first all
            
            # Always allow access to whitelist domains
            http_access allow whitelist
            # Setup allowed acls
            # Allow local network(s) on interface(s)
            http_access allow allowed_subnets
            http_access allow localnet
            # Default block all to be sure
            http_access deny allsrc
            
            icap_enable on
            icap_send_client_ip on
            icap_send_client_username on 
            icap_client_username_encode off
            icap_client_username_header X-Authenticated-User
            icap_preview_enable on
            icap_preview_size 1024
            
            icap_service service_req reqmod_precache bypass=0 icap://127.0.0.1:1344/squidclamav
            icap_service service_resp respmod_precache bypass=0 icap://127.0.0.1:1344/squidclamav
            
            adaptation_access service_req allow all
            adaptation_access service_resp allow all
            
            

            Never Fear, A Geek is Here!

            1 Reply Last reply Reply Quote 0
            • A
              aGeekhere
              last edited by

              I have finally solved windows updates /adobe updates or any other update error :)
              In Proxy server: General settings under Custom ACLS (Before_Auth)  put

              Update

              Need to test a few things, will post back

              
              always_direct allow all
              ssl_bump server-first all
              
              acl broken_sites dstdomain .update.microsoft.com
              acl broken_sites dstdomain .ds.download.windowsupdate.com
              acl broken_sites dstdomain .swupdl.adobe.com
              acl broken_sites dstdomain .ccmdl.adobe.com
              ssl_bump none broken_sites
              
              

              sorry, only worked because Squid crashed and i did not see it.
              Still cannot connect

              Never Fear, A Geek is Here!

              1 Reply Last reply Reply Quote 0
              • A
                aGeekhere
                last edited by

                I still have not found a fix for windows updates (thinking there is a bug in squid3-dev)

                Where can we post bugs for squid3-dev? Here?

                So far I have found issue with
                Windows updates
                Adobe updates

                SSL filtering websites issues
                https://dolphin-emu.org/
                will add more later

                Never Fear, A Geek is Here!

                1 Reply Last reply Reply Quote 0
                • W
                  webstor
                  last edited by

                  Hi,

                  is your squidguard running as parent from squid?
                  If the answer is yes and you are using ssl bumping, then it is getting bypassed.

                  1 Reply Last reply Reply Quote 0
                  • A
                    aGeekhere
                    last edited by

                    Hi , not sure what you mean by "parent"  but any ideas how we can get windows updates working?

                    Never Fear, A Geek is Here!

                    1 Reply Last reply Reply Quote 0
                    • W
                      webstor
                      last edited by

                      Yes, custom acl which is not getting decrypted.

                      1 Reply Last reply Reply Quote 0
                      • A
                        aGeekhere
                        last edited by

                        Yes, custom acl

                        I tried custom ACLs but they did not work.

                        which is not getting decrypted.

                        Is that the reason why the custom ACLs are not working?

                        I guess the question is:

                        Has anyone been able to get windows updates working using custom acls for SSL filtering?

                        And if so can they post an example (as I am sure other people are having the same issue with this)

                        Never Fear, A Geek is Here!

                        1 Reply Last reply Reply Quote 0
                        • A
                          agixdota
                          last edited by

                          i hope  :-[

                          1 Reply Last reply Reply Quote 0
                          • C
                            Cino
                            last edited by

                            pull request to bring changes into the package
                            https://github.com/pfsense/pfsense-packages/pull/787

                            1 Reply Last reply Reply Quote 0
                            • F
                              Firzze
                              last edited by

                              Hi, :)
                              So with ssl filtering, windows update does not want to do this. There in there a manipulation to do to solve this problem.
                              Sorry for my bad english  ;D

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.