Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can Lightsquid log HTTPS without man in the middle?

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    7 Posts 5 Posters 3.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      Mothra
      last edited by

      Installed Lightsquid and it's working great… only issue is it's only logging HTTP connections. Is there a way to set it up so it merely logs HTTPS connections, but without having to turn on MITM in the Squid options?

      TIA

      1 Reply Last reply Reply Quote 0
      • C
        chris4916
        last edited by

        Do you mean using transparent or explicit proxy?  ???

        If you have configured transparent proxy, then it doesn't work, obviously  ;)

        Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

        1 Reply Last reply Reply Quote 0
        • M
          Mothra
          last edited by

          I have transparent on for Squid and Lightsquid is logging all HTTP connections from everything on the network… but only when I set the proxy on each machine will it log HTTPS connections for that device only... it appends :443 to the end of HTTPS connections.

          I'd like it so while in transparent mode, it would log HTTPS for everything... if possible.

          1 Reply Last reply Reply Quote 0
          • H
            heper
            last edited by

            https is designed to prevent this.

            only way is to be evil & do mitm

            1 Reply Last reply Reply Quote 0
            • KOMK
              KOM
              last edited by

              That's how HTTPS works.  If you want to intercept HTTPS then you need either an explicit proxy or a transparent proxy with a pfSense certificate installed on every single client.  WPAD gives you the best of both worlds since you don't have to touch the client but you can still filter HTTPS.

              1 Reply Last reply Reply Quote 0
              • C
                chris4916
                last edited by

                @KOM:

                That's how HTTPS works.  If you want to intercept HTTPS then you need either an explicit proxy or a transparent proxy with a pfSense certificate installed on every single client.  WPAD gives you the best of both worlds since you don't have to touch the client but you can still filter HTTPS.

                Filter, at "domain" level but also have some logs too  ;)

                Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  The actual domain and URL requested from a particular IP address are inside the encrypted session.

                  
                  GET /index.html HTTP/1.1
                  Host: www.example.com
                  
                  

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.