Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Squid MITM Proxy certificate error

    Scheduled Pinned Locked Moved Cache/Proxy
    9 Posts 4 Posters 4.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 8
      8bitz
      last edited by

      I am trying to configure PFSense 2.3.2, with Squid.

      I have squid configured in transparent mode with a local CA, have exported the certificate, installed it on my endpoints and made sure it is trusted.  I have made sure not to configure the proxy on the clients.

      HTTP proxy is working as expected, but HTTPS is not. Every time I go to an HTTPS site, the browser throws an error about a hostname mismatch on the certificate.

      I have been looking into this all morning, and cannot find a way around the issue. Some of the posts that I have seen actually refer to this being built in behavior with the browser to prevent MITM attacks.

      Am I just missing something with the configuration, or is this a known issue with chrome/safari?

      If anyone could provide some information on what I might be missing, I would appreciate it.

      Thanks

      1 Reply Last reply Reply Quote 0
      • P
        pfsensation
        last edited by

        I've been literally scratching my head for a while now a this issue. I've been searching all over and I think I just found something useful on Stackoverflow which talks about having to supply an extra alternative name parameter to the certificates. http://stackoverflow.com/questions/43665243/chrome-invalid-self-signed-ssl-cert-subject-alternative-name-missing

        I think PfSense/Squid may need an update to support this automatically via the GUI, because chrome really isn't accepting my self signed certificates. It's really annoying because I can't get my Squid working with HTTPS interception anymore… :(

        I know it can be achieved because at my college they use smoothwall and theirs is working fine.

        1 Reply Last reply Reply Quote 0
        • 8
          8bitz
          last edited by

          If you look at the cert, the common name is the IP and not the actual domain name.

          I selected the option to force an IP lookup, but this didn't change anything.

          I'll post back if I find anything else.

          Thanks

          1 Reply Last reply Reply Quote 0
          • P
            pfsensation
            last edited by

            @8bitz:

            If you look at the cert, the common name is the IP and not the actual domain name.

            I selected the option to force an IP lookup, but this didn't change anything.

            I'll post back if I find anything else.

            Thanks

            Seems it could be an issue with Squid not correctly forging the certificates. I've already kinda reported this issue to Squid maintainer (Doktornotor) but no decent reply. I think I even had a hard time understanding or explaining this issue lol, even with screenshots. I'm glad I'm not alone now, because I literally tried reinstalling pfsense, running x86 version on VMware, and all sorts…The problem of course now I know is to do with browsers upping the security.

            PS : Maybe you should get this thread moved to Cache/Proxy section. Doktornotor checks that section more it seems.

            1 Reply Last reply Reply Quote 0
            • 8
              8bitz
              last edited by

              Reposted in cache/proxy

              https://forum.pfsense.org/index.php?topic=129823.msg715323#msg715323

              1 Reply Last reply Reply Quote 0
              • 8
                8bitz
                last edited by

                quick update:

                Was under the impression that the upgrade to 2.3.4 was supposed to fix this issue, but it still isn't working.

                I have recreated the CA, redeployed the certificate, and still get the error.

                Does anyone have any additional thoughts?

                ![Screen Shot 2017-05-05 at 3.19.48 PM.png](/public/imported_attachments/1/Screen Shot 2017-05-05 at 3.19.48 PM.png)
                ![Screen Shot 2017-05-05 at 3.19.48 PM.png_thumb](/public/imported_attachments/1/Screen Shot 2017-05-05 at 3.19.48 PM.png_thumb)

                1 Reply Last reply Reply Quote 0
                • P
                  pfsensation
                  last edited by

                  @8bitz:

                  quick update:

                  Was under the impression that the upgrade to 2.3.4 was supposed to fix this issue, but it still isn't working.

                  I have recreated the CA, redeployed the certificate, and still get the error.

                  Does anyone have any additional thoughts?

                  It's a issue with Chrome using a non standard policy. I am on the same boat, however I am about to ditch Squid's HTTPS interception for E2Guardian. E2Guardian's source has been updated to fix this issue : https://github.com/e2guardian/e2guardian/issues/216

                  Just waiting on Marcelloc to update his E2Guardian package to the latest version, which he's already working on, and then I'll use E2G to create the forged SSL certificates and hopefully breathe a sigh of relief when Chrome works again. At some point this issue should be fixed for Squid too, but then again since SquidGuard is rubbish and full of bugs. It's less of a bother.

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    @pfsensation:

                    I think PfSense/Squid may need an update to support this automatically via the GUI, because chrome really isn't accepting my self signed certificates. It's really annoying because I can't get my Squid working with HTTPS interception anymore… :(

                    This is impossible to fix in pfSense. Squid's ssl_crtd needs to be fixed to generate certificates with SAN.

                    http://bugs.squid-cache.org/show_bug.cgi?id=4711

                    For tracking only: https://redmine.pfsense.org/issues/7524

                    1 Reply Last reply Reply Quote 0
                    • K
                      Kowolski
                      last edited by

                      Sophos had this error with chrome too, they were able to patch it. https://community.sophos.com/products/unified-threat-management/f/general-discussion/91085/https-scanning-web-protection-ssl-error-err_cert_common_name_invalid

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.