Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unofficial E2guardian package for pfSense

    Scheduled Pinned Locked Moved Cache/Proxy
    1.2k Posts 70 Posters 1.4m Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      Stewart
      last edited by

      @marcelloc:

      Unselect any autentication, save and apply(and maybe restart the service). The small documentation on proxy-header says that you must select a http header field to identify as users, and then add them on groups

      
      # Proxy-header auth plugin
      # FredB August 2016
      # Identifies users with header;
      # relies upon the upstream proxy.
      # Eg: in groups file
      # Mozilla/5.0 (Windows NT 6.1; rv:47.0) Gecko/20100101 Firefox/47.0=filter3
      # here:
      # header = 'user-agent'
      
      

      Is there a difference between "None" and not having any selected?

      1 Reply Last reply Reply Quote 0
      • S
        Stewart
        last edited by

        With no authentication set I now get an Access Denied page from Squid.

        When I access a page the Squid logs show:

        1491926079.428      3 127.0.0.1 TCP_MISS/403 4185 GET http://forum.pfsense.com/ - HIER_NONE/- text/html
        1491926079.455    248 127.0.0.1 TCP_MISS/403 4287 GET http://forum.pfsense.com/ - ORIGINAL_DST/127.0.0.1 text/html
        1491926079.499      2 127.0.0.1 TCP_MEM_HIT/200 13066 GET http://localhost:3128/squid-internal-static/icons/SN.png - HIER_NONE/- image/png
        1491926079.599      1 127.0.0.1 TAG_NONE/409 4118 CONNECT urs.microsoft.com:443 - HIER_NONE/- text/html
        1491926079.601      1 127.0.0.1 TAG_NONE/409 4118 CONNECT urs.microsoft.com:443 - HIER_NONE/- text/html
        

        /var/log/e2guardian/access.log shows:

        2017.4.11 13:29:04 - 192.168.1.100 http://forum.pfsense.com/  GET 3849 0  1 403 text/html  Default   - -
        2017.4.11 13:29:04 - 192.168.1.100 https://urs.microsoft.com:443  CONNECT 4118 0  1 200 -  Default   - -
        2017.4.11 13:29:04 - 192.168.1.100 https://urs.microsoft.com:443  CONNECT 4118 0  1 200 -  Default   - -
        
        

        No matter what page I go to, I get those same 5 lines.  The first 2 vary depending on where I go but the last 3 are exactly the same.  If I point directly to the Squid proxy port then pages load.  If I pass through transparently then it works.  If I point to the port 8080 for e2guardian it fails.  I've gone back and undone the changes I made to proxy-header.conf and everything loads properly now.  I've deselected all auth plugins on the General page.

        EDIT:  Well, not every time.  I also get

        1491928118.800 86400440 192.168.1.157 TAG_NONE/200 0 CONNECT 216.58.218.2:443 - HIER_NONE/- -
        1491928118.800 86400301 192.168.1.157 TAG_NONE_TIMEDOUT/409 0 CONNECT pagead2.googlesyndication.com:443 - HIER_NONE/- text/html;charset=utf-8
        
        

        EDIT 2:  Here's my config:

        forcequicksearch = off
        reverseaddresslookups = off
        reverseclientiplookups = off
        logclienthostnames = off
        createlistcachefiles = on
        prefercachedlists = off
        maxcontentfiltersize = 256
        maxcontentramcachescansize = 1000
        maxcontentfilecachescansize = 2000
        filecachedir = '/tmp'
        deletedownloadedtempfiles = on
        initialtrickledelay = 20
        trickledelay = 20
        downloadmanager = '/usr/local/etc/e2guardian/downloadmanagers/fancy.conf'
        downloadmanager = '/usr/local/etc/e2guardian/downloadmanagers/trickle.conf'
        downloadmanager = '/usr/local/etc/e2guardian/downloadmanagers/default.conf'
        contentscannertimeout = 60
        contentscanexceptions = off
        mapauthtoports = off
        recheckreplacedurls = off
        forwardedfor = off
        usexforwardedfor = off
        logconnectionhandlingerrors = on
        logsslerrors = off
        logchildprocesshandling = off
        maxchildren = 120
        minchildren = 8
        minsparechildren = 8
        preforkchildren = 10
        maxsparechildren = 64
        maxagechildren = 500
        maxips = 0
        ipcfilename = '/tmp/.dguardianipc'
        urlipcfilename = '/tmp/.dguardianurlipc'
        ipipcfilename = '/tmp/.dguardianipipc'
        nodaemon = off
        nologger = off
        logadblocks = off
        loguseragent =
        daemonuser = 'clamav'
        daemongroup = 'nobody'
        softrestart = on
        cacertificatepath = '/etc/ssl/demoCA/cacert.pem'
        caprivatekeypath = '/etc/ssl/demoCA/private/cakey.pem'
        certprivatekeypath = '/etc/ssl/demoCA/private/serverkey.pem'
        generatedcertpath = '/usr/local/etc/e2guardian/ssl/generatedcerts'
        
        
        1 Reply Last reply Reply Quote 0
        • P
          pfsensation
          last edited by

          Wanted to say, thanks for bringing this project back alive. Been waiting an extremely long time for E2 Guardian, as it seems to tick all my boxes in being able to scan HTTPS traffic properly, without having to rely on a black list or DNS based blocking. Most people don't seem to understand the importance of HTTPS scanning, even knowing that there's always new proxies, and websites coming along to bypass blocks.

          How is the status of the package now? I see Stewart is saying that it isn't working, is it working for everyone else?

          1 Reply Last reply Reply Quote 0
          • marcellocM
            marcelloc
            last edited by

            I've tested normal proxy and SSL interception. Did not started testing authentication and antivirus integration

            Treinamentos de Elite: http://sys-squad.com

            Help a community developer! ;D

            1 Reply Last reply Reply Quote 0
            • S
              Stewart
              last edited by

              @pfsensation:

              Wanted to say, thanks for bringing this project back alive. Been waiting an extremely long time for E2 Guardian, as it seems to tick all my boxes in being able to scan HTTPS traffic properly, without having to rely on a black list or DNS based blocking. Most people don't seem to understand the importance of HTTPS scanning, even knowing that there's always new proxies, and websites coming along to bypass blocks.

              How is the status of the package now? I see Stewart is saying that it isn't working, is it working for everyone else?

              I've wiped the box I was having problems with and will go back to testing once my other projects simmer down since I couldn't ever get it to work properly.  I'll report back here once I get back on it.

              1 Reply Last reply Reply Quote 0
              • P
                pfsensation
                last edited by

                So I got this setup at basic level, and have got a phrase list up. However, how do I get it to scan HTTPS sites? I have a phrase list up for pornography, and it seems to be working for http sites but not HTTPS. And now it seems more and more websites are moving to HTTPS.

                I am purely trying to test the phrase matching system, and make sure that this system is able to block those sites.

                1 Reply Last reply Reply Quote 0
                • marcellocM
                  marcelloc
                  last edited by

                  Create the CA on pfSense
                  apply it on e2guardian config
                  Install ca certificate on browser

                  Treinamentos de Elite: http://sys-squad.com

                  Help a community developer! ;D

                  1 Reply Last reply Reply Quote 0
                  • S
                    Stewart
                    last edited by

                    @marcelloc:

                    Create the CA on pfSense
                    apply it on e2guardian config
                    Install ca certificate on browser

                    I thought it could be done transparently in e2Guardian.  Is that not so?

                    1 Reply Last reply Reply Quote 0
                    • P
                      pfsensation
                      last edited by

                      @marcelloc:

                      Create the CA on pfSense
                      apply it on e2guardian config
                      Install ca certificate on browser

                      Got it working by setting "Filter SSL sites forging SSL certificates" on group settings. However I am getting a error saying common name invalid on chrome, its working on Edge and Internet Explorer. Also, is there anyway to modify the block page? The standard DansGuardian one looks pretty terrible.

                      1 Reply Last reply Reply Quote 0
                      • marcellocM
                        marcelloc
                        last edited by

                        @Stewart:

                        I thought it could be done transparently in e2Guardian.  Is that not so?

                        I don't think so. To anylize the page content, it needs to be in the middle. The splice all feature on squid, if I'm not worng, extracts sites included on remote ip certificate and check against acls, no interception at all is done this way.

                        Treinamentos de Elite: http://sys-squad.com

                        Help a community developer! ;D

                        1 Reply Last reply Reply Quote 0
                        • marcellocM
                          marcelloc
                          last edited by

                          @pfsensation:

                          is there anyway to modify the block page? The standard DansGuardian one looks pretty terrible.

                          Sure, just need to edit template file on gui. Try to not include any javascript on it. At least on previous package version, pfSense GUI was including some extra code from active session.

                          Treinamentos de Elite: http://sys-squad.com

                          Help a community developer! ;D

                          1 Reply Last reply Reply Quote 0
                          • P
                            pfsensation
                            last edited by

                            What browser is everyone else using for HTTPS inspection? Chrome just doesn't seem to want to accept the self signed certificate. Even though I have it installed on my system as a trusted root CA.

                            1 Reply Last reply Reply Quote 0
                            • marcellocM
                              marcelloc
                              last edited by

                              I use chrome. What chrome complains about the site?  Is the generated certificate different from the site your are trying to access?

                              Treinamentos de Elite: http://sys-squad.com

                              Help a community developer! ;D

                              1 Reply Last reply Reply Quote 0
                              • P
                                pfsensation
                                last edited by

                                @marcelloc:

                                I use chrome. What chrome complains about the site?  Is the generated certificate different from the site your are trying to access?

                                Chrome complains about a missing alternative name, seems like it could be an issue relating to the way Squid forges certificates.

                                Here's a link to what I found regarding this issue, seems it's related to browsers upping security. I know you can get around this for sure since they do it at my school using smoothwall.

                                http://stackoverflow.com/questions/43665243/chrome-invalid-self-signed-ssl-cert-subject-alternative-name-missing

                                1 Reply Last reply Reply Quote 0
                                • P
                                  pfsensation
                                  last edited by

                                  Found a small issue, when you block a category of domains using black list. When you try to visit any domain in that category it shows categories as : N/A, instead of showing the actual category.

                                  1 Reply Last reply Reply Quote 0
                                  • marcellocM
                                    marcelloc
                                    last edited by

                                    @pfsensation:

                                    Found a small issue, when you block a category of domains using black list. When you try to visit any domain in that category it shows categories as : N/A, instead of showing the actual category.

                                    Saw this while using Dansguardian in the past. Do you think it's an old bug or something with report template file?

                                    Treinamentos de Elite: http://sys-squad.com

                                    Help a community developer! ;D

                                    1 Reply Last reply Reply Quote 0
                                    • P
                                      pfsensation
                                      last edited by

                                      @marcelloc:

                                      @pfsensation:

                                      Found a small issue, when you block a category of domains using black list. When you try to visit any domain in that category it shows categories as : N/A, instead of showing the actual category.

                                      Saw this while using Dansguardian in the past. Do you think it's an old bug or something with report template file?

                                      Maybe an old bug, because it does seem to show the category if you use phrase lists.

                                      1 Reply Last reply Reply Quote 0
                                      • marcellocM
                                        marcelloc
                                        last edited by

                                        e2guardian v 4.1 is stable now. I'll start updating the package for this new version.

                                        Looks like it will not need anymore changes on SO to allow more then 1024 clients. On current compiled version I've set it to 4096 IIRC.

                                        https://github.com/e2guardian/e2guardian/releases

                                        Treinamentos de Elite: http://sys-squad.com

                                        Help a community developer! ;D

                                        1 Reply Last reply Reply Quote 0
                                        • E
                                          exograpix
                                          last edited by

                                          Thanks marcelloc for your effort, if possible, please provide us exact steps to install and configure for e2guardian. guide will be highly appreciated.

                                          1 Reply Last reply Reply Quote 0
                                          • P
                                            pfsensation
                                            last edited by

                                            @exograpix:

                                            Thanks marcelloc for your effort, if possible, please provide us exact steps to install and configure for e2guardian. guide will be highly appreciated.

                                            Basic setup is explained in OP and on Github.

                                            @Marcelloc, the search engine tab is still broken in the GUI D:  However, wanted to say hats off to you man! Just got this setup in my home environment, no longer in VM. I've only got it setup basically with domain blocking now. I know phrase lists work since I tested in a virtual environment, I will set that up too when I understand how it properly works. As the algorithm of how the system decides a website is good or bad + the options available is slightly overwhelming.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.