Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SquidGuard se genera el error certificado de seguridad

    Scheduled Pinned Locked Moved Español
    4 Posts 3 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      esva
      last edited by

      Hola a Todos

      He instalado Pfsense y seguido el procedimiento para instalar con squid en modo transparente con HTTPS. El cual bloquea las páginas HTTPS si las tengo en Blacklist sin tener problema con el certificado.
      Pero cuando activo  SquidGuard se genera el error (certificado de seguridad de este sitio web)
      Como puedo solucionar este inconveniente o que otra opción hay para filtrar?

      Versiones que utilizo
      Pfsense 2.3.2-RELEASE 
      Squid 3.5.19

      squid.conf

      
      # This file is automatically generated by pfSense
      # Do not edit manually !
      
      http_port 192.168.5.1:3128 ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/local/etc/squid/serverkey.pem capath=/usr/local/share/certs/ cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:HIGH:!RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS dhparams=/etc/dh-parameters.2048 options=NO_SSLv2,NO_SSLv3,SINGLE_DH_USE
      
      http_port 127.0.0.1:3128 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/local/etc/squid/serverkey.pem capath=/usr/local/share/certs/ cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:HIGH:!RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS dhparams=/etc/dh-parameters.2048 options=NO_SSLv2,NO_SSLv3,SINGLE_DH_USE
      
      https_port 127.0.0.1:3129 intercept ssl-bump generate-host-certificates=on dynamic_cert_mem_cache_size=10MB cert=/usr/local/etc/squid/serverkey.pem capath=/usr/local/share/certs/ cipher=EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:HIGH:!RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS dhparams=/etc/dh-parameters.2048 options=NO_SSLv2,NO_SSLv3,SINGLE_DH_USE
      
      icp_port 0
      dns_v4_first on
      pid_filename /var/run/squid/squid.pid
      cache_effective_user squid
      cache_effective_group proxy
      error_default_language es
      icon_directory /usr/local/etc/squid/icons
      visible_hostname localhost
      cache_mgr admin@localhost
      access_log /var/squid/logs/access.log
      cache_log /var/squid/logs/cache.log
      cache_store_log none
      netdb_filename /var/squid/logs/netdb.state
      pinger_enable on
      pinger_program /usr/local/libexec/squid/pinger
      sslcrtd_program /usr/local/libexec/squid/ssl_crtd -s /var/squid/lib/ssl_db -M 4MB -b 2048
      sslcrtd_children 5
      sslproxy_capath /usr/local/share/certs/
      sslproxy_options NO_SSLv2,NO_SSLv3,SINGLE_DH_USE
      sslproxy_cipher EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA384:EECDH+ECDSA+SHA256:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH+aRSA+RC4:EECDH:EDH+aRSA:HIGH:!RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS
      sslproxy_cert_error allow all
      sslproxy_cert_adapt setValidBefore all
      
      logfile_rotate 0
      debug_options rotate=0
      shutdown_lifetime 3 seconds
      # Allow local network(s) on interface(s)
      acl localnet src  192.168.5.0/24
      forwarded_for on
      uri_whitespace strip
      
      acl dynamic urlpath_regex cgi-bin ?
      cache deny dynamic
      
      cache_mem 64 MB
      maximum_object_size_in_memory 256 KB
      memory_replacement_policy heap GDSF
      cache_replacement_policy heap LFUDA
      minimum_object_size 0 KB
      maximum_object_size 4 MB
      cache_dir ufs /var/squid/cache 100 16 256
      offline_mode off
      cache_swap_low 90
      cache_swap_high 95
      cache allow all
      # Add any of your own refresh_pattern entries above these.
      refresh_pattern ^ftp:    1440  20%  10080
      refresh_pattern ^gopher:  1440  0%  1440
      refresh_pattern -i (/cgi-bin/|?) 0  0%  0
      refresh_pattern .    0  20%  4320
      
      #Remote proxies
      
      # Setup some default acls
      # From 3.2 further configuration cleanups have been done to make things easier and safer. The manager, localhost, and to_localhost ACL definitions are now built-in.
      # acl localhost src 127.0.0.1/32
      acl allsrc src all
      acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901  3128 3129 1025-65535 
      acl sslports port 443 563  
      
      # From 3.2 further configuration cleanups have been done to make things easier and safer. The manager, localhost, and to_localhost ACL definitions are now built-in.
      #acl manager proto cache_object
      
      acl purge method PURGE
      acl connect method CONNECT
      
      # Define protocols used for redirects
      acl HTTP proto HTTP
      acl HTTPS proto HTTPS
      acl blacklist dstdom_regex -i '/var/squid/acl/blacklist.acl'
      http_access allow manager localhost
      
      http_access deny manager
      http_access allow purge localhost
      http_access deny purge
      http_access deny !safeports
      http_access deny CONNECT !sslports
      
      # Always allow localhost connections
      # From 3.2 further configuration cleanups have been done to make things easier and safer.
      # The manager, localhost, and to_localhost ACL definitions are now built-in.
      # http_access allow localhost
      
      request_body_max_size 0 KB
      delay_pools 1
      delay_class 1 2
      delay_parameters 1 -1/-1 -1/-1
      delay_initial_bucket_level 100
      delay_access 1 allow allsrc
      
      # Reverse Proxy settings
      
      # Package Integration
      url_rewrite_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf
      url_rewrite_bypass off
      url_rewrite_children 16 startup=8 idle=4 concurrency=0
      
      # Custom options before auth
      always_direct allow all
      ssl_bump server-first all
      
      # Block access to blacklist domains
      http_access deny blacklist
      always_direct allow all
      ssl_bump server-first all
      # Setup allowed ACLs
      # Allow local network(s) on interface(s)
      http_access allow localnet
      # Default block all to be sure
      http_access deny allsrc
      
      
      1 Reply Last reply Reply Quote 0
      • F
        fabshdz
        last edited by

        Hola yo lo estuve intentando por mucho tiempo y efectivamente… no funciona correctamente.

        Lo he pasado a modo No trasparente y ahí si funciona bien, el detalle está con los dispositivos moviles que entran y salen de la red continuamente.

        Me han comentado mucho sobre WPAD que en teoría envía los parámetros de la red, como si se tratase de un simple DHCP.

        Apenas estoy con esa configuración por lo que no te podría decir que tan bien me a ido.

        En resumidas cuentas, o renuncias al SquidGuard con sus Blacklist y solo dejas el Squid Transparente bloqueando los https y armando tus propias blacklist.
        O dejas el SquidGuard con sus Blacklist, pero en modo No Trasparente, y las páginas https que quieras bloquear, tendrás que hacerlo a mano en el Blacklist

        1 Reply Last reply Reply Quote 0
        • E
          esva
          last edited by

          Gracias por el aporte
          La verdad también e intentando por WPAD.

          https://www.javcasta.com/pfsense-2-3-wpad-con-nginx
          https://nguvu.org/pfsense/pfSense-2.3-WPAD-PAC-proxy-configuration-guide

          Configure los navegadores con la opción de “Autodetectar  o detectar la configuración automáticamente”, pero no logro que los navegadores tomen la configuración del proxy

          1 Reply Last reply Reply Quote 0
          • S
            sistemasrefrinorte.com
            last edited by

            @esva:

            Gracias por el aporte
            La verdad también e intentando por WPAD.

            https://www.javcasta.com/pfsense-2-3-wpad-con-nginx
            https://nguvu.org/pfsense/pfSense-2.3-WPAD-PAC-proxy-configuration-guide

            Configure los navegadores con la opción de “Autodetectar  o detectar la configuración automáticamente”, pero no logro que los navegadores tomen la configuración del proxy

            Hola

            Has tenido algún avance con esto?, es que tengo el mismo problema.

            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.