Guide to filtering web content (http and https) with pfsense 2.3
-
Can anybody help me?
I test pfsense for gateway/proxy for a company. But I have one strange trouble:
The pfsense is installed and work but if I use it for access (through proxy) to https://code.getmdl.io/1.2.1/material.grey-orange.min.css I have in proxy log:
Date IP Status Address User Destination
16.09.2016 14:37:28 192.168.1.222 TAG_NONE/503 code.getmdl.io:443 - -
What is it an how I must to do that resolve it?UPDATE 28/10/2016 - This was provider :) not pfsense!
-
Which rule should be above between these two?
FIRST –
"Now we are going to create a rule that will force the network to use our route as the DNS server.
In Firewall/NAT/Port forward
add a new ruleInterface = LAN
Protocol = TCP/UDP
Source ports = *
Dest address = *
Dest ports = 53
NAT IP = 127.0.0.1
NAT Ports = 53
Description = Redirect DNS
LAN TCP/UDP * * * 53 127.0.0.1 53 Redirect DNS
Save"SECOND --
"To stop users from bypassing your proxy setup a new firewall lan rule and block port 80 and 443
IPv4 TCP * * * 80 - 443 * none.
Save" -
I found this post and I am researching to see how well it will work.
https://forum.pfsense.org/index.php?topic=106016.0
The idea is to use the wpad for https content and have a transperrent proxy for http traffic. This could remove the bypass rules for programs with no proxy settings and need to use port 80.
Update
OK it looks to be working fine, now all the traffic that was block on port 80 is now using the transperrent proxy, you will still need a pass rule for port 443 but not for port 80.So you can use the wpad for http and https filtering (or for just https) and enable the transperrent proxy to catch the leftovers.
How to do this?
-
Which rule should be above between these two?
FIRST –
"Now we are going to create a rule that will force the network to use our route as the DNS server.
In Firewall/NAT/Port forward
add a new ruleInterface = LAN
Protocol = TCP/UDP
Source ports = *
Dest address = *
Dest ports = 53
NAT IP = 127.0.0.1
NAT Ports = 53
Description = Redirect DNS
LAN TCP/UDP * * * 53 127.0.0.1 53 Redirect DNS
Save"SECOND --
"To stop users from bypassing your proxy setup a new firewall lan rule and block port 80 and 443
IPv4 TCP * * * 80 - 443 * none.
Save"first one on top
I found this post and I am researching to see how well it will work.
https://forum.pfsense.org/index.php?topic=106016.0
The idea is to use the wpad for https content and have a transperrent proxy for http traffic. This could remove the bypass rules for programs with no proxy settings and need to use port 80.
Update
OK it looks to be working fine, now all the traffic that was block on port 80 is now using the transperrent proxy, you will still need a pass rule for port 443 but not for port 80.So you can use the wpad for http and https filtering (or for just https) and enable the transperrent proxy to catch the leftovers.
How to do this?
after you have the wpad setup and working enable transperrent proxy in squid
-
If I configure a VPN, I assume this will all still work? i.e. the filtering is done post decryption?
I'm not using the wpad portion of this, so I've ignore d what it says about VPNs in there…
-
Sorry I'm new in pfsense.
I have an internal DNS server windows server 2008. How can I blocked internal computers to direct access to http. I want to filter it through pfsense firewall. Can you give me some screen shots or sample of rules and where can I put this?
I want all computers to go first in pfsense proxy before connecting to internet. I already configure transparent proxy.
Thanks for the help.
-
"How can I blocked internal computers to direct access to http"
read the part in the guide about blocking port 80 and 443 and instead of using pfsense as your DNS server use your internal one, (for more help on this issue ask in the Cache/Proxy forum)."If I configure a VPN, I assume this will all still work? i.e. the filtering is done post decryption?….I'm not using the wpad portion of this, so I've ignore d what it says about VPNs in there..."
If the transparent proxy has issue with the vpn you may need to bypass it. -
thanks for this tutorial. i am not using dns resolver but bind. can you also show how to configure bind.
-
Have not used bind, but after a quick google try http://blog.muhammadattique.com/configuring-bind-dns-server-on-pfsense-firewall/
If it does not help ask in the main forum
-
"To stop users from bypassing your proxy setup a new firewall lan rule and block port 80 and 443
IPv4 TCP * * * 80 - 443 * none.
SaveSet your system to automatically detect settings (for windows it is in internet options connections lan settings).
You also have to set up the proxy setting for each program that cant connect (firefox, graphics drive software, vlc etc)
If you have programs that cannot connect and have no proxy setting you need to setup a firewall aliases
Firewall/Aliases/IP
and add the destination server ip (use wire shark to help find the blocked Ips or in your firewall block rule enable Log packets that are handled by this rule, use http://ip-lookup.net/index.php to check what it is and add to the Aliases. If it is part of a domain add the domain)
now create a new firewall lan rule
IPv4 TCP * * * passAliases 80- 443 * pass rule.Save"
Not sure where to setup/configure above firewall lan rule.
-
Thank you for the guide - i got everything working as expected. However, I need to enable content filter on a 2nd interface (Guest). What sort of config addition is needed to enable content filtering on the 2nd additional interface.
-
In the Part 3 you refer to *.local in proxy.pac file as well as unbound configuration.
if (isPlainHostName(host) || shExpMatch(host, "*.local") || isInNet(dnsResolve(host), "192.168.1.0", "255.255.255.0")) return "DIRECT";
When user sets up pfSense the domain defaults to "localdomain" in System/General Setup and there is explicit sentence about not using .local as a domain name:
Do not use 'local' as a domain name. It will cause local hosts running mDNS (avahi, bonjour, etc.) to be unable to resolve local hosts not running mDNS.
Do we need to modify the domain to "local" in System/General Setup or should we replace ".local" with ".localdomain"?
-
Use a domain like this
pfsense.thisismydomain.localDo not use
pfsense.local.localThe PAC does not need changing
-
Hi,
I am using the method mentioned here, through unbound. Is there a way i can let few static IP's skip the youtube safe settings in the unbound. I tried asking about segregating those ip's but then i have to use bind which i dont know about. If there is a way to skip the DMZ (i have lan, opt1, opt2 and dmz), that would help also, as i can put those static IP's on DMZ
I think it was mentioned somewhere to use port 5353 and use DNS forwader in conjunction with Unbound, but i cant find any tutorial for it. Also, i cant find any way to split the DNS i dont know if that would help. All I want is some computers can visit youtube and dont get blocked for videos. Even pfsense tutorials get blocked by it.
Any ideas as to where to look for or what to look for would help,
thanks for the great tutorial.Molykule
-
Beautiful guide!
I decided to move from ipcop to pfsense just to filter some https, I followed this guide (with the updates). Everything seems to work fine before some users start complaining mainly android apps not working (play store, snapchat, whatsapp..etc) I managed to locate the blocked (using firewall log) then create a bypass rule with the IP or Port for the whole network, however other clients start having similar issues as if those apps working on different IPs for certain devices (all android)
I read this topic 4 times, reinstall from zero three times without any improvement towards this issue which begins after applying the proxy with wpad.
I appreciate any advice even if an easier approach to filter some unwanted https sites.
Thank you. -
On the android phone (wireless setting) try setting the proxy settings manually, instead of auto or none.
-
On the android phone (wireless setting) try setting the proxy settings manually, instead of auto or none.
Finally, with manual proxy settings I have a stable communication with android devices.
You are the MAN!
-
Update Youtube safe mode
Click add under Host overrides
Host = www
Domain = youtube.com
IP = 216.239.38.120
Description = youtube
Save
NOTE: Safe search for youtube is not as advanced as google safe search, which results in a lot of safe content be filtered out.How can we get this working with mobile devices Android and iOS that use the youtube mobile app or m.youtube.com?
I can't express how useful this guide been for me.
For the record I found the below is working for youtube mobile app safe search:
Host = youtube Domain = googleapis.com IP = 216.239.38.120 Description = youtube app1
Host = youtubei Domain = googleapis.com IP = 216.239.38.120 Description = youtube app2
and maybe..
Host = www Domain = youtube-nocookie.com IP = 216.239.38.120 Description = youtube nocookie
in addition to what's mentioned in Reply#60 for mobile browsers.
-
Thanks huuur, that should help others.
Though it would be good if youtube was better at filtering videos.
-
Update
You can try setting up MITM by setting the SSL/MITM Mode to splice all, that way you do not need to create a certificate for each device on the network. (you still need to create a main certificate though).