Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SSLBUMP without MITM

    Scheduled Pinned Locked Moved Cache/Proxy
    58 Posts 11 Posters 26.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • jimpJ
      jimp Rebel Alliance Developer Netgate
      last edited by

      Ah, so all you need is the whitelist ".*" and the rest happens automatically? Cool. That does seem to work.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        Yeah, it's basically "supertransparent", as in - no certificates forged/no need to install certs on clients. (And yeah, obviously it's limited in sense that you just get enough info about the connection for SquidGuard to do its job, but nothing else, i.e., no content filtering/AV/etc.)

        Perhaps could use some hints in the GUI…

        1 Reply Last reply Reply Quote 0
        • jimpJ
          jimp Rebel Alliance Developer Netgate
          last edited by

          Would be nice to kick that in somehow when CA = "None" when using SSL Interception, or at least allow CA = None to be set in that case. It doesn't seem like that should be necessary since it isn't going to be using the CA when acting in that role. I haven't tried it though, maybe squid is dumb and still needs it set.

          Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

          Need help fast? Netgate Global Support!

          Do not Chat/PM for help!

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            Yeah, afraid that's a no go, the certs are really required - plus, the ACL (whitelist) can be anything there and be changed at any time,  or have lines prepended/appended, really no way for Squid to figure out it's not going to need to fake any certs.

            (But you could generate a temporary one for the CA in the background on each config resync; would need additional logic/code though in squid.inc. If you want something like this, I'd prefer having a separate checkbox for this, with some JS logic that'd gray out/disable unneeded MITM stuff in the GUI, and use a different ACL than the current whitelist for that, basically just use the built-in "all" one - like ssl_bump splice all)

            1 Reply Last reply Reply Quote 0
            • S
              shonjir
              last edited by

              I'm running a variation of this config in transparent mode with squidguard and shallalist quite successfully.

              I'm not sure why exactly, but this configuration improves over basic step 1 peek and splice all by allowing logging of the server certificate (instead of just IP address), domain blocking of SSL sites via squidguard list, and provides an alternate splice operation for certain sites that for some reason cannot connect after the certificate name is captured.

              # peek at client TLS-request to get SNI
              # peek at server cert (for logging)
              # splice earlySplice at step 3 only
              acl earlySplice ssl::server_name "*.crashplan.com"
              ssl_bump peek step1
              ssl_bump peek step2 earlySplice
              ssl_bump splice step3 earlySplice
              ssl_bump splice all
              sslproxy_cert_error deny all
              
              
              1 Reply Last reply Reply Quote 0
              • D
                doktornotor Banned
                last edited by

                Well yes, that will no doubt improve splice since you get whole lot more information available at steps 2/3, as explained here:
                https://github.com/pfsense/FreeBSD-ports/blob/devel/www/pfSense-pkg-squid/files/usr/local/pkg/squid.inc#L1539

                The above makes bumping impossible, however.

                It's not possible to do zillion variants in the GUI. Use Advanced Options, Custom ACLs (before auth).

                1 Reply Last reply Reply Quote 0
                • S
                  shonjir
                  last edited by

                  The above makes bumping impossible, however.

                  This is understood.  For my use case, I don't need full blown MiTM - logging the site name and simple domain blocking are sufficient.

                  Right now I'm using custom ACLs for this.  It's a hack (because it supersedes the auto-generated ssl_bump directives that follow), but it works.

                  It would be nice if it were available as a simple toggle in the config or if the various ssl config options were exposed for customization under 'advanced', but it works reasonably well as-is.

                  Thank you for your work making this tool available!

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    I'll see if something reasonable can be added for

                    • splice everything without bump (i.e., splice all)
                    • custom splice ACLs/settings (some advanced textarea burried somewhere, if you break it, your problem)

                    without overcomplicating the GUI and confusing everyone.

                    1 Reply Last reply Reply Quote 0
                    • D
                      doktornotor Banned
                      last edited by

                      OK, how's this?

                      https://github.com/pfsense/FreeBSD-ports/pull/269

                      ssl_mitm_mode_01.png
                      ssl_mitm_mode_01.png_thumb
                      ssl_mitm_mode_02.png
                      ssl_mitm_mode_02.png_thumb

                      1 Reply Last reply Reply Quote 0
                      • jimpJ
                        jimp Rebel Alliance Developer Netgate
                        last edited by

                        Looks great, we're getting that PR merged in right now, thanks!

                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                        Need help fast? Netgate Global Support!

                        Do not Chat/PM for help!

                        1 Reply Last reply Reply Quote 0
                        • D
                          doktornotor Banned
                          last edited by

                          Thanks for testing/feedback. Any volunteers to fixrewrite SquidGuard now? (No, I cannot do it. Tried many times, unable to work with that code for more than a couple of minutes.)

                          1 Reply Last reply Reply Quote 0
                          • F
                            fabiomello
                            last edited by

                            e2guardian its more active…
                            if you want to replace squidGuard with e2guardian i could do this!

                            what you think?

                            https://github.com/e2guardian/e2guardian

                            1 Reply Last reply Reply Quote 0
                            • D
                              doktornotor Banned
                              last edited by

                              @fabiomello:

                              e2guardian its more active…
                              if you want to replace squidGuard with e2guardian i could do this!

                              what you think?

                              https://github.com/e2guardian/e2guardian

                              Hmmm… good luck.

                              • https://forum.pfsense.org/index.php?topic=87526.0
                              • https://github.com/pfsense/pfsense-packages/pull/866
                              1 Reply Last reply Reply Quote 0
                              • jimpJ
                                jimp Rebel Alliance Developer Netgate
                                last edited by

                                From the history there it looks like it had a similar problem to squidGuard. Whatever happens, it needs a ground-up rewrite with up-to-date style and practices all-around.

                                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                Need help fast? Netgate Global Support!

                                Do not Chat/PM for help!

                                1 Reply Last reply Reply Quote 0
                                • D
                                  doktornotor Banned
                                  last edited by

                                  Yeah. The XMLs in the linked e2guardian PR would be a good starting point to get a grip of potential feature set. The PHP code there still needs major work, though it must have been a  lot better than SquidGuard, considering I've been able to somehow finish the code style at least. :P

                                  The PHP-generated package XML is a major can of worms there.

                                  Plus note, that PR was for 2.2.x, lots of changes meanwhile.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    susamlicubuk
                                    last edited by

                                    Good job. Congratulations.
                                    Tag_none / 200 for all https and ip address is not good to appear in logs
                                    Do you have a solution for this problem?
                                    A manual DNS problem can sometimes cause the page not found error
                                    We continue to test this issue

                                    Tag_None.JPG
                                    Tag_None.JPG_thumb

                                    1 Reply Last reply Reply Quote 0
                                    • D
                                      doktornotor Banned
                                      last edited by

                                      And the issue is exactly what? TAG_NONE/XXX means spliced connection. It works. Really nothing to fix here. This is a TCP tunnel, Squid won't handle any HTTP there.

                                      http://squid-web-proxy-cache.1019090.n4.nabble.com/TAG-NONE-xxxx-td4672150.html

                                      If you have issues with some sites, you'll need to use some custom ACL and custom config for that at the moment, I'm afraid.

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        susamlicubuk
                                        last edited by

                                        @doktornotor:

                                        And the issue is exactly what? TAG_NONE/XXX means spliced connection. It works. Really nothing to fix here. This is a TCP tunnel, Squid won't handle any HTTP there.

                                        http://squid-web-proxy-cache.1019090.n4.nabble.com/TAG-NONE-xxxx-td4672150.html

                                        If you have issues with some sites, you'll need to use some custom ACL and custom config for that at the moment, I'm afraid.

                                        I have tested it for a long time on the old version
                                        I have tested the following settings
                                        I used 2 different settings

                                        acl https_proto proto https
                                        always_direct allow https_proto
                                        ssl_bump none localhost
                                        sslproxy_options NO_SSLv2,NO_SSLv3,No_Compression
                                        sslproxy_cipher ALL:!SSLv2:!ADH:!DSS:!MD5:!EXP:!DES:!PSK:!SRP:!RC4:!IDEA:!SEED:!aNULL:!eNULL

                                        TLS/SSL bumping definitions

                                        acl tls_s1_connect at_step SslBump1
                                        acl tls_s2_client_hello at_step SslBump2
                                        acl tls_s3_server_hello at_step SslBump3

                                        TLS/SSL bumping steps

                                        ssl_bump peek tls_s1_connect all
                                        ssl_bump splice all

                                        peek at TLS/SSL connect data

                                        splice: no active bumping

                                        acl bump_step1 at_step SslBump1
                                        ssl_bump peek bump_step1 all
                                        ssl_bump splice all
                                        sslproxy_cert_error deny all
                                        ssl_bump splice whitelist
                                        ssl_bump bump all

                                        There are too many reverse ip addresses in squid logs.
                                        So the lightsquid report is mixed.
                                        Maybe it's about reverse proxy.
                                        It works fine at startup
                                        But there are some page faults that are sometimes not found when using for a long time.
                                        (Google search result after clicking on page unresponsive or https sites sometimes very slow)
                                        I think squid is having trouble with https dns resolution.
                                        I only saw problems with windows pc's
                                        I have not received any errors on iOS and android mobile devices
                                        This caused the reason for not continuing with wpad for PCs.
                                        But mobile devices can use it.

                                        We can do acl setting but we need to enter too many https domain gui den
                                        A difficult and problematic job
                                        But I added some sites squid- acl- white list
                                        I'm not sure we're adding it this way

                                        ..google.com
                                        .
                                        .google.com.tr

                                        Please manually enter external dns on windows computers and test
                                        This problem is a bit strange
                                        Sometimes page not found or too slow browser problem
                                        For example 8.8.8.8 or open dns
                                        Maybe we can solve this problem with all the DNS requests with the Pfsense redirection rule.

                                        1 Reply Last reply Reply Quote 0
                                        • D
                                          doktornotor Banned
                                          last edited by

                                          Please, start your own thread. DNS issues are totally off-topic here. Also, this thread is NOT about reverse proxy, at all. Thanks.

                                          Finally, as noted above and linked on the Squid ML, the log is absolutely normal, expected and there is nothing that could be done here. If you don't want things spliced, then don't use splice. If you don't want logs, don't log. If you need logs filtered, you'll need to filter them as you need. And if you want something better than TAG_NONE in logs, you'll need to get that implemented upstream.

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            shonjir
                                            last edited by

                                            @doktornotor:

                                            OK, how's this?

                                            https://github.com/pfsense/FreeBSD-ports/pull/269

                                            This is awesome, thanks @doktornotor!  I'll be installing this package and testing shortly.

                                            Edit:  Package works great!  One thing I noticed is that custom MITM options only get added when 'custom' mode is set - the package works fine as is, but a note in the help text would make this clearer.

                                            Thanks again!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.