Guide to filtering web content (http and https) with pfsense 2.3
-
After using your guide, can I enable the MITM section in Squid, step up the CA and certs and it should then inspect https?
No, the wpad is doing that, the reason why we are using a wpad is so we do not have to use certs. So no transperrent proxy or man in the middle. Do not enable these options!
Also, under System/General/DNS Server Settings should we have/not have any DNS servers listed? I'm guessing we need some listed as this is where pfsense will get its DNS cache from?
You should include your isp dns (there is an option for that) and add the fastest DNS servers in your area, fill the list up, the DNS cache will get build up as you search the net, it does not just download every DNS address from the DNS server, you would run out of ram if it did.
I hope that I have cleared a few things up, have you got your setup working?
no, not working. As soon as I enable the firewall rule there is no access to the internet. With the firewall rule disabled I have access but the eicar test files do not get blocked like they did when in transparent mode indicating the proxy is not being used.
-
Can't get HTTPS scanning to work. See https sites passing through squid but clamd won't scan the files. Works fine on HTTP and it catches the virus files. Using proxy setting in browser since wpad isn't giving the results I am expecting.
-
no, not working. As soon as I enable the firewall rule there is no access to the internet. With the firewall rule disabled I have access but the eicar test files do not get blocked like they did when in transparent mode indicating the proxy is not being used.
Is that the port 80 and 443 block rule? If so than that is correct, now set your device to auto configure proxy. In windows go to global internet settings and there is an option for that, and for each program you have set its proxy settings. For programs with no proxy settings create a pass rule.
Can't get HTTPS scanning to work. See https sites passing through squid but clamd won't scan the files. Works fine on HTTP and it catches the virus files. Using proxy setting in browser since wpad isn't giving the results I am expecting.
Hi, first try above post, second I have not tried clamd scanning because I have found it to have issues, best to ask this question in the proxy forum.
Using proxy setting in browser since wpad isn't giving the results I am expecting
You have to tell your browser to use system settings and in global internet settings set proxy to auto configure.
-
Can't get HTTPS scanning to work. See https sites passing through squid but clamd won't scan the files. Works fine on HTTP and it catches the virus files. Using proxy setting in browser since wpad isn't giving the results I am expecting.
Same issue here now.
I enabled the 80-443 block rule, unchecked the 'Transparent" option in Squid and I can only get access if I manually enter the wpad.dat location into my local computer(s) settings. Auto discovery does not work. I'm on all Apple computers/devices here btw. Same issue with ClamAV, it scans http but not https as poster above.
-
Auto config works for me. What I meant in the original post was that the WPAD direction info I was writing was not proper hence was using straight proxy settings for the time being. Will be experimenting with the WPAD file at a later time.
I seriously doubt HTTPS scanning (not filtering) with clamd is working. I have followed the configuration directions to the T and yet the only thing which does not work is https clamd scans for viruses. I believe its a Squid issue.
-
Post a link to the https fake virus test file that you are testing and I will see if it works for me.
-
http://www.eicar.org/85-0-Download.html
There is one group for http, and one group for https.
-
There are 4 https links
https://secure.eicar.org/eicar.com
https://secure.eicar.org/eicar.com.txt
https://secure.eicar.org/eicar_com.zip
https://secure.eicar.org/eicarcom2.zip -
Would you know how to get the below google safesearch info in pfSense BIND DNS?
server: include: /var/unbound/forecegoogle.conf
-
Ok done some research squidclamav only supports http not https because it is encrypted.
would you know how to get the below google safesearch info in pfSense BIND DNS?
Not sure you will need to ask that in the proxy forum.
-
Ok done some research squidclamav only supports http not https because it is encrypted.
I just did a test. Squidclamav will scan https traffic when using Squids MITM option..
-
Ok done some research squidclamav only supports http not https because it is encrypted.
I just did a test. Squidclamav will scan https traffic when using Squids MITM option..
And that would need certificates have to be installed on the clients..
-
Ok done some research squidclamav only supports http not https because it is encrypted.
I just did a test. Squidclamav will scan https traffic when using Squids MITM option..
And that would need certificates have to be installed on the clients..
Correct.
-
To help stop virus or spywhere we can enable squidguard block list blk_BL_spyware,
-
What is the point of all the safesearch nonsense and redirecting users to only use your dns.. You do understand when a proxy is being used, the proxy does the query not the client..
-
While setting up wpad we'r supposed ot enter the following into /usr/local/www/wpad.da:
function FindProxyForURL(url, host)
{
if (isPlainHostName(host) ||
shExpMatch(host, "*.local") ||
isInNet(dnsResolve(host), "192.168.1.0", "255.255.255.0"))
return "DIRECT";return "PROXY 192.168.1.1:3128";
}I've actually changed my pfsense server ip to 192.168.0.1 - do I need to edit both ip addresses listed above?
-
What is the point of all the safesearch nonsense and redirecting users to only use your dns.. You do understand when a proxy is being used, the proxy does the query not the client..
I think the point of the safe search is to stop, say your young kids, from Googling porn images. I'm not sure about the dns redirecting.
-
What is the point of all the safesearch nonsense and redirecting users to only use your dns.. You do understand when a proxy is being used, the proxy does the query not the client..
I think the point of the safe search is to stop, say your young kids, from Googling porn images. I'm not sure about the dns redirecting.
1. What is the point of forcing search engines from using safe search?
Answer: To aid in the filtering of adult content, this is most importantly for google images as squidguard does not block them, if you do not want to filter web content then this guide is not designed for you.2. What is the point of redirecting users to use THEIR pfsense router as the DNS server.
Answer: There are many advantages not all relating to web filtering however tries and stops the user from bypassing the dns redirect rule.While setting up wpad we'r supposed ot enter the following into /usr/local/www/wpad.da:
function FindProxyForURL(url, host)
{
if (isPlainHostName(host) ||
shExpMatch(host, "*.local") ||
isInNet(dnsResolve(host), "192.168.1.0", "255.255.255.0"))
return "DIRECT";return "PROXY 192.168.1.1:3128";
}I've actually changed my pfsense server ip to 192.168.0.1 - do I need to edit both ip addresses listed above?
Yes, set it to 192.168.0.0
-
I'm constantly getting these entries in the Squid Real Time log:
01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:59488 - - 01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:55735 - - 01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:49806 - - 01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:46365 - - 01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:38156 - - 01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:25012 - - 01.07.2016 06:06:34 192.168.1.5 TCP_DENIED/403 127.0.0.1:24866 - - 01.07.2016 06:06:33 192.168.1.5 TCP_DENIED/403 127.0.0.1:14826 - - 01.07.2016 06:06:33 192.168.1.5 TCP_DENIED/403 127.0.0.1:10196 - - 01.07.2016 06:06:33 192.168.1.5 TCP_DENIED/403 127.0.0.1:6263 - -
192.168.1.5 is my local machine. Is this normal?
Update: Resolved this in another thread..
-
To stop users from bypassing your proxy setup a new firewall lan rule and block port 80 and 443
Just to clarify - this is to prevent users from bypassing the proxy altogether, rather than just bypassing the autoproxy/wpad stuff?