• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Splice and Bump based on source IPs and destination domains

Scheduled Pinned Locked Moved Cache/Proxy
9 Posts 6 Posters 4.3k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B
    BluBoy
    last edited by Nov 14, 2017, 9:41 AM

    First and foremost, I have setup squid with HTTPS splice-all on pfSense at home and it is working better than I ever thought possible.
    Being able to see basic HTTPS usage data and logs is great!

    Now I want to bump a few hosts at home (Mostly because I have NFI how to install certs on devices at home (Chromecasts, Roku, Kindles, etc)
    Can I have a whitelist for internal IP addresses (my laptop and mobile) that will be bumped (for Blacklist/AV inspection), while all others continue to be spliced (so I can see a summary of who is accessing certain domains).

    In addition to this, I'd also like to exclude certain domains from being bumped (such as when I browse my banking site). Can I also whitelist destination domains

    Finally, I'm not reading many good things about squidguard or [dans/e2]guardian.
    Has anyone used https://www.diladele.com/licensing.html before as the web filter and http://www.squidblacklist.org/ for the blacklist?

    Thanks

    1 Reply Last reply Reply Quote 0
    • S
      sichent Banned
      last edited by Nov 14, 2017, 12:48 PM

      Hello BluBoy, if you have questions about web safety ask me.

      1 Reply Last reply Reply Quote 0
      • B
        Bismarck
        last edited by Nov 14, 2017, 1:50 PM

        This is my running "SSL/MITM Mode: Custom" config:

        # some banking sites that should not be MITM-ed
        acl no_ssl_bump ssl::server_name .mybank.com
        acl no_ssl_bump ssl::server_name .whatsapp.com
        acl no_ssl_bump ssl::server_name .whatsapp.net
        # some source IPs that should not be MITM-ed
        acl splice_only src 10.0.1.7
        acl splice_only src 10.0.1.8
        acl splice_only src 10.0.1.19
        # get SNI obtained by parsing TLS Client Hello during step2
        # (which is instructed by ssl_bump peek step1)
        acl step1 at_step SslBump1
        # no_ssl_bump and splice_only
        ssl_bump peek step1
        ssl_bump splice no_ssl_bump
        ssl_bump splice splice_only
        # bump the rest
        ssl_bump bump all
        
        1 Reply Last reply Reply Quote 0
        • B
          BluBoy
          last edited by Nov 15, 2017, 9:02 AM

          @sichent:

          Hello BluBoy, if you have questions about web safety ask me.

          You may have already had an email from me.
          The personal usage limit of 7 devices is insanely low. Most households have multiple people, each with multiple devices which would exceed this quite easily.
          I've been very eager to try it, but that limit has prevented me for so long (your support was great, responding extremely quickly with a possible solution. But how many people would go to the effort of querying your license restriction over email?)

          @Bismarck:

          This is my running "SSL/MITM Mode: Custom" config:

          # some banking sites that should not be MITM-ed
          acl no_ssl_bump ssl::server_name .mybank.com
          acl no_ssl_bump ssl::server_name .whatsapp.com
          acl no_ssl_bump ssl::server_name .whatsapp.net
          # some source IPs that should not be MITM-ed
          acl splice_only src 10.0.1.7
          acl splice_only src 10.0.1.8
          acl splice_only src 10.0.1.19
          # get SNI obtained by parsing TLS Client Hello during step2
          # (which is instructed by ssl_bump peek step1)
          acl step1 at_step SslBump1
          # no_ssl_bump and splice_only
          ssl_bump peek step1
          ssl_bump splice no_ssl_bump
          ssl_bump splice splice_only
          # bump the rest
          ssl_bump bump all
          

          This looks like it is exactly what I am after.
          Rather than using URLs, I take it I can feed it a list instead?

          Also, what settings have you used on the configuration page?
          If you are able to, would you mind sharing a screenshot please?

          Thanks!

          1 Reply Last reply Reply Quote 1
          • B
            Bismarck
            last edited by Nov 15, 2017, 10:45 AM

            @BluBoy:

            Also, what settings have you used on the configuration page?
            If you are able to, would you mind sharing a screenshot please?

            Thanks!

            Nothing special, just the default settings, screenshot attached. And yes you can extend that list of domains and IPs as you like.

            Maybe good to know:

            https://wiki.squid-cache.org/SquidFaq/WindowsUpdate#Squid_with_SSL-Bump_and_Windows_Updates

            https://docs.diladele.com/faq/squid/index.html

            If you do AV scanning, feed clamav with extra signatures:

            Info: http://sanesecurity.com/usage/signatures/

            Script: https://github.com/extremeshok/clamav-unofficial-sigs

            Cheers!

            sslbump.jpg
            sslbump.jpg_thumb

            1 Reply Last reply Reply Quote 0
            • S
              slim2016
              last edited by Feb 8, 2018, 12:27 PM

              Thanks, this is worked fine for me

              @Bismarck:

              This is my running "SSL/MITM Mode: Custom" config:

              # some banking sites that should not be MITM-ed
              acl no_ssl_bump ssl::server_name .mybank.com
              acl no_ssl_bump ssl::server_name .whatsapp.com
              acl no_ssl_bump ssl::server_name .whatsapp.net
              # some source IPs that should not be MITM-ed
              acl splice_only src 10.0.1.7
              acl splice_only src 10.0.1.8
              acl splice_only src 10.0.1.19
              # get SNI obtained by parsing TLS Client Hello during step2
              # (which is instructed by ssl_bump peek step1)
              acl step1 at_step SslBump1
              # no_ssl_bump and splice_only
              ssl_bump peek step1
              ssl_bump splice no_ssl_bump
              ssl_bump splice splice_only
              # bump the rest
              ssl_bump bump all
              
              1 Reply Last reply Reply Quote 0
              • G
                giacomo
                last edited by Apr 30, 2018, 10:34 AM

                Hi All,

                I'm trying to use your hints on my configuration.
                I need to put a subnet (e.g. 192.168.0.0/24) with Splice All and all the other traffic with Splice Whitelist, Bump Otherwise.

                Thank you!

                1 Reply Last reply Reply Quote 0
                • S
                  slim2016
                  last edited by Apr 30, 2018, 9:37 PM

                  @giacomo:

                  Hi All,

                  I'm trying to use your hints on my configuration.
                  I need to put a subnet (e.g. 192.168.0.0/24) with Splice All and all the other traffic with Splice Whitelist, Bump Otherwise.

                  Thank you!

                  Did you try this

                  some banking sites that should not be MITM-ed

                  acl no_ssl_bump ssl::server_name .mybank.com

                  some source IPs that should not be MITM-ed

                  acl splice_only src 192.168.0.0/24

                  get SNI obtained by parsing TLS Client Hello during step2

                  (which is instructed by ssl_bump peek step1)

                  acl step1 at_step SslBump1

                  no_ssl_bump and splice_only

                  ssl_bump peek step1
                  ssl_bump splice no_ssl_bump
                  ssl_bump splice splice_only

                  bump the rest

                  ssl_bump bump all

                  1 Reply Last reply Reply Quote 0
                  • JonathanLeeJ
                    JonathanLee
                    last edited by Aug 17, 2022, 4:49 PM

                    @bluboy Thank you I used the ACL for a XBOX to splice only so I could still SSL check other devices with certificates

                    Screen Shot 2022-08-17 at 9.49.10 AM.png

                    This way I can cache and check for viruses on my laptop and my son can watch xbox and play games.

                    Make sure to upvote

                    1 Reply Last reply Reply Quote 0
                    • First post
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                      This community forum collects and processes your personal information.
                      consent.not_received