Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Guide to filtering web content (http and https) with pfsense 2.3

    Scheduled Pinned Locked Moved Documentation
    190 Posts 54 Posters 224.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      molykule
      last edited by

      Hi,

      I am using the method mentioned here, through unbound. Is there a way i can let few static IP's skip the youtube safe settings in the unbound. I tried asking about segregating those ip's but then i have to use bind which i dont know about. If there is a way to skip the DMZ (i have lan, opt1, opt2 and dmz), that would help also, as i can put those static IP's on DMZ
      I think it was mentioned somewhere to use port 5353 and use DNS forwader in conjunction with Unbound, but i cant find any tutorial for it. Also, i cant find any way to split the DNS i dont know if that would help. All I want is some computers can visit youtube and dont get blocked for videos. Even pfsense tutorials get blocked by it.
      Any ideas as to where to look for or what to look for would help,
      thanks for the great tutorial.

      Molykule

      1 Reply Last reply Reply Quote 0
      • H
        huuur
        last edited by

        Beautiful guide!
        I decided to move from ipcop to pfsense just to filter some https, I followed this guide (with the updates). Everything seems to work fine before some users start complaining mainly android apps not working (play store, snapchat, whatsapp..etc) I managed to locate the blocked (using firewall log) then create a bypass rule with the IP or Port for the whole network, however other clients start having similar issues as if those apps working on different IPs for certain devices (all android)
        I read this topic 4 times, reinstall from zero three times without any improvement towards this issue which begins after applying the proxy with wpad.
        I appreciate any advice even if an easier approach to filter some unwanted https sites.
        Thank you.

        1 Reply Last reply Reply Quote 0
        • A
          aGeekhere
          last edited by

          On the android phone (wireless setting) try setting the proxy settings manually, instead of auto or none.

          Never Fear, A Geek is Here!

          1 Reply Last reply Reply Quote 0
          • H
            huuur
            last edited by

            @aGeekHere:

            On the android phone (wireless setting) try setting the proxy settings manually, instead of auto or none.

            Finally, with manual proxy settings I have a stable communication with android devices.

            You are the MAN!

            1 Reply Last reply Reply Quote 0
            • H
              huuur
              last edited by

              @maverik1:

              @aGeekHere:

              Update Youtube safe mode
              Click add under Host overrides
              Host = www
              Domain = youtube.com
              IP =  216.239.38.120
              Description = youtube
              Save
              NOTE: Safe search for youtube is not as advanced as google safe search, which results in a lot of safe content be filtered out.

              How can we get this working with mobile devices Android and iOS that use the youtube mobile app or m.youtube.com?

              I can't express how useful this guide been for me.

              For the record I found the below is working for youtube mobile app safe search:

              
              Host = youtube
              Domain = googleapis.com
              IP =  216.239.38.120
              Description = youtube app1
              
              
              
              Host = youtubei
              Domain = googleapis.com
              IP =  216.239.38.120
              Description = youtube app2
              
              

              and maybe..

              
              Host = www
              Domain = youtube-nocookie.com
              IP =  216.239.38.120
              Description = youtube nocookie
              
              

              in addition to what's mentioned in Reply#60 for mobile browsers.

              1 Reply Last reply Reply Quote 0
              • A
                aGeekhere
                last edited by

                Thanks huuur, that should help others.

                Though it would be good if youtube was better at filtering videos.

                Never Fear, A Geek is Here!

                1 Reply Last reply Reply Quote 0
                • A
                  aGeekhere
                  last edited by

                  Update

                  You can try setting up MITM by setting the SSL/MITM Mode to splice all, that way you do not need to create a certificate for each device on the network. (you still need to create a main certificate though).

                  Never Fear, A Geek is Here!

                  1 Reply Last reply Reply Quote 0
                  • V
                    vielfede
                    last edited by

                    @aGeekHere:

                    Update

                    You can try setting up MITM by setting the SSL/MITM Mode to splice all, that way you do not need to create a certificate for each device on the network. (you still need to create a main certificate though).

                    That works fine for me also setting Client proxy settings manually:
                    Proxy address/PORT= SQUID_IP 3128

                    And that only! Indeed if i specify different proxy settings for http/https in (client win10=> Internet Settings=>Lan settings=>Advanced=>

                    • http=SQUID_IP 3128
                    • https=SQUID_IP 3129

                    It does not work, as in the contrary I'd excpect….  ::)
                    Geek can you explain why?

                    1 Reply Last reply Reply Quote 0
                    • A
                      aGeekhere
                      last edited by

                      Does automatically detect settings work?

                      Never Fear, A Geek is Here!

                      1 Reply Last reply Reply Quote 0
                      • V
                        vielfede
                        last edited by

                        @aGeekHere:

                        Does automatically detect settings work?

                        Ehmm sorry, could you explain me better what you mean? As I stated I do not use WPAD, I configure proxy manually on client see picture…

                        Thanks.
                        PS. Sorry to answer late

                        ProxyClientSettings.JPG
                        ProxyClientSettings.JPG_thumb

                        1 Reply Last reply Reply Quote 0
                        • A
                          aGeekhere
                          last edited by

                          if you have the transparent proxy working then you do not need to define the proxy server.

                          Never Fear, A Geek is Here!

                          1 Reply Last reply Reply Quote 0
                          • V
                            vielfede
                            last edited by

                            If I use it in transparent mode, https does not work!
                            Better sometimes it works, sometimes it does not! (http works always!)

                            If anyone managed to get http+https in splice all + transparent mode work please let me know… ;)

                            1 Reply Last reply Reply Quote 0
                            • A
                              aGeekhere
                              last edited by

                              I just enabled it mitm, added a cert, set it to splice all and its working.

                              Never Fear, A Geek is Here!

                              1 Reply Last reply Reply Quote 0
                              • T
                                techbee
                                last edited by

                                The guide is update but confusing.  Can you please clean up the guide and have it step by step.  Its somewhat hard to follow if you are not familiar with wpad and related firewall rules.

                                Thanks for the guide.

                                1 Reply Last reply Reply Quote 0
                                • A
                                  aGeekhere
                                  last edited by

                                  hi techbee, yeah after discovering a few new things the guide is a little messy now.

                                  The transparent proxy with MITM (splice all) vs wpad should really be divided into two different choices. When I made the guide I did not know that all you need to get transparent proxy for https working is set splice all and create a cert for the router. So in fact you can now choose either using a wpad or the transparent proxy MITM or both.

                                  when i get time I will try an clean it up a bit.

                                  Never Fear, A Geek is Here!

                                  1 Reply Last reply Reply Quote 0
                                  • V
                                    vielfede
                                    last edited by

                                    @aGeekHere:

                                    The transparent proxy with MITM (splice all) vs wpad should really be divided into two different choices. When I made the guide I did not know that all you need to get transparent proxy for https working is set splice all and create a cert for the router. So in fact you can now choose either using a wpad or the transparent proxy MITM or both.

                                    Indeed I do not think MITM and splice all can work toghether, as stated on squid documentation MITM is associated to the "bump" directive that is something complety different from splice directive.
                                    With MITM (bump) squid is able to decrypt traffic (and analyse it) meanwhile with splice all you can do is just "web filtering".
                                    Summarizing
                                    Directive          Advantages/features                                                                    Disadvantage
                                    Splice (all)        No needs of certificate installation on Clients + webfiltering              No traffic analysis i.e no AntiVirus
                                    Bump (MITM)    Traffic analysis i.e noYES AntiVirus    + webfiltering                              Needs to install certs on clients

                                    Please take a look here and let me know if I missed something. Thanks
                                    http://wiki.squid-cache.org/Features/SslPeekAndSplice#Actions
                                    http://marek.helion.pl/install/squid.html

                                    1 Reply Last reply Reply Quote 1
                                    • A
                                      AR15USR
                                      last edited by

                                      @vielfede:

                                      @aGeekHere:

                                      The transparent proxy with MITM (splice all) vs wpad should really be divided into two different choices. When I made the guide I did not know that all you need to get transparent proxy for https working is set splice all and create a cert for the router. So in fact you can now choose either using a wpad or the transparent proxy MITM or both.

                                      Indeed I do not think MITM and splice all can work toghether, as stated on squid documentation MITM is associated to the "bump" directive that is something complety different from splice directive.
                                      With MITM (bump) squid is able to decrypt traffic (and analyse it) meanwhile with splice all you can do is just "web filtering".
                                      Summarizing
                                      Directive          Advantages/features                                                                    Disadvantage
                                      Splice (all)        No needs of certificate installation on Clients + webfiltering              No traffic analysis i.e no AntiVirus
                                      Bump (MITM)    Traffic analysis i.e no AntiVirus    + webfiltering                              Needs to install certs on clients

                                      Please take a look here and let me know if I missed something. Thanks
                                      http://wiki.squid-cache.org/Features/SslPeekAndSplice#Actions
                                      http://marek.helion.pl/install/squid.html

                                      Shouldn't the second one not have the word "no"..


                                      2.6.0-RELEASE

                                      1 Reply Last reply Reply Quote 0
                                      • V
                                        vielfede
                                        last edited by

                                        @AR15USR:

                                        Shouldn't the second one not have the word "no"..

                                        Sorry cut & paste mistake, I fixed it.

                                        1 Reply Last reply Reply Quote 0
                                        • M
                                          mahnonsaprei
                                          last edited by

                                          Hi at all,

                                          I'm Marcello from italy. Nice to meet you, i'm a newbie of pfsense.

                                          I have read the tutorial, but i have one problem.
                                          When i try to connect to an https website in blacklist, the browser show me a generic error see the attachment: (ERR_TUNNEL_CONNECTION_FAILED) while i want to see a message of pfsense that explain the block. In http it's ok

                                          I'm looking for in google but i not found the answer.

                                          Please help me.
                                          Thank you veeeeery much!!!

                                          error.PNG
                                          error.PNG_thumb

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            aGeekhere
                                            last edited by

                                            When i try to connect to an https website in blacklist, the browser show me a generic error see the attachment: (ERR_TUNNEL_CONNECTION_FAILED) while i want to see a message of pfsense that explain the block. In http it's ok

                                            Known issue with squid, I do not think there is a fix for it.

                                            Never Fear, A Geek is Here!

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.