Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Pfsense 2.2.2 + squid3 transparent HTTP/HTTPS proxy "Facebook partially loading"

    Scheduled Pinned Locked Moved Cache/Proxy
    24 Posts 13 Posters 14.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      billywilliam
      last edited by

      Good Night Guys,

      I´m the same problem, but using only transparent´s squid work normally facebook according to the pictures below "see the options Remote Cert Checks are do not verify remote certificate" When allow the options in Remote Cert Checks: do not verify remote Certificate. But When to allow options in Remote Cert Checks: Accept remote server certificate Errors open only misconfigured pages and other don´t load.
      When I do integrated with squid-guard , load for me this error in browser (ssl_error_rx_record_too_long) according to the last pictures below.

      print1.PNG
      print1.PNG_thumb
      print2.PNG
      print2.PNG_thumb
      print3.PNG
      print3.PNG_thumb
      print4.PNG
      print4.PNG_thumb
      print5.PNG
      print5.PNG_thumb
      lastimage.png
      lastimage.png_thumb

      1 Reply Last reply Reply Quote 0
      • V
        viniciusferrao
        last edited by

        The problem with akamaidhd.net still persists as today. Has someone found a good solution? I've disabled SSL interception on my SquidProxy, but it would be good to turn it on again in near future.

        1 Reply Last reply Reply Quote 0
        • C
          cnd.fflv
          last edited by

          Just a suggestion…

          What if you whitelist fb in the proxy filter, and instead make blocking/ limiting rules in firewall based on fb's IPs? It will be quite long list of IPs, but you can make an alias and work with it.

          1 Reply Last reply Reply Quote 0
          • J
            juninhoandrade
            last edited by

            same problem  :'(

            1 Reply Last reply Reply Quote 0
            • A
              agixdota
              last edited by

              @JuniorAndrade:

              same problem  :'(

              Its simple, you should selected "Do not verify remote cert" on the webgui proxy server.

              1 Reply Last reply Reply Quote 0
              • C
                chris4916
                last edited by

                @91X:

                Its simple, you should selected "Do not verify remote cert" on the webgui proxy server.

                Issue might not be with the remote certificate but the one generated at proxy level that is not signed by trusted CA. Such control, if any, depends on remote side.

                Frankly I'm not using such MITM feature that I perceive as a way of twisting the HTTPS concept but if implementing such stuff is totally mandatory for you, why not using at proxy level certificate signed by well known CA? This should solve the issue, as far as I understand  8)

                Not verifying remote cert in proxy server webgui means that proxy doesn't check is remote web server is using trusted certificate. I'll be surprised if either facebook or CDN do not rely on such private certs or certificates signed with CA not in pfSense "trusted CA" repository but why not…  ???  To be checked.

                Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                1 Reply Last reply Reply Quote 0
                • J
                  jkrueger2020
                  last edited by

                  Sorry to revive an old thread, but I too am having the exact same issue with pfSense 2.2.5 (Squid3 - 0.4.2 - 3.4 branch).  I noticed the problem is happening to me even when I turn the transparent mode off and manually connect to the proxy as well.

                  Has anyone found a solution other than the "do not verify" option that has been mentioned? That doesn't seem like a safe solution given that I can't use that option only for Facebook.

                  1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM
                    last edited by

                    If you're running in explicit mode then you should not have any of the SSL Interception stuff enabled.  It's only for transparent mode.

                    1 Reply Last reply Reply Quote 0
                    • C
                      chris4916
                      last edited by

                      @KOM:

                      If you're running in explicit mode then you should not have any of the SSL Interception stuff enabled.  It's only for transparent mode.

                      If you don't mind, I'm not 100% in line with this statement  :-\

                      Not discussing about the "is it acceptable to deploy MITM or not?" debate, once you decide to go for this, it may help for both explicit and transparent proxy design, as far a I understand. It will help much more with transparent proxy, I do agree but what MITM will bring is, even for explicit proxy, capability to analyse HTTP content, e.g. with anti-virus.

                      Without MITM, explicit proxy is only able to control CONNECT and therefore decide if access to given URL is authorized (e.g. Squidguard) but content is encrypted.
                      With MITM enabled, you have 2 different connections with Squid in the middle, able to look at content.

                      Am I correct?  ???

                      Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                      1 Reply Last reply Reply Quote 0
                      • KOMK
                        KOM
                        last edited by

                        My understanding was that the proxies act in exactly the same way where content is concerned, regardless of mode.

                        1 Reply Last reply Reply Quote 0
                        • J
                          jkrueger2020
                          last edited by

                          I'm running in transparent mode - not explicit mode. So no one has a solution for this problem? I hate to give up on pfSense but unless I get a solution I may have no other choice . . .

                          1 Reply Last reply Reply Quote 0
                          • KOMK
                            KOM
                            last edited by

                            I have seen cases where squid will return incomplete pages with HTTPS sites.  One possible solution was to prioritize IP4 when doing DNS lookups.  Go to your squid settings and check the Resolve DNS IPv4 First box and see if that makes any difference for you.  Other than that, I highly recommend not using Transparent mode ever.

                            1 Reply Last reply Reply Quote 0
                            • P
                              phoenixsampras
                              last edited by

                              Same Problem!!

                              Dear lord, is pfsense getting worst with every version?? now https doesnt work with proxy….. traffic shapping doesnt work with XENSERVER, etc.

                              What's wrong Pfsense?? this are basic stuff!! come on!!

                              1 Reply Last reply Reply Quote 0
                              • A
                                agixdota
                                last edited by

                                @phoenixsampras:

                                Same Problem!!

                                Dear lord, is pfsense getting worst with every version?? now https doesnt work with proxy….. traffic shapping doesnt work with XENSERVER, etc.

                                What's wrong Pfsense?? this are basic stuff!! come on!!

                                yeah  ::)

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.