Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Splice and Bump based on source IPs and destination domains

    Scheduled Pinned Locked Moved Cache/Proxy
    9 Posts 6 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      BluBoy
      last edited by

      First and foremost, I have setup squid with HTTPS splice-all on pfSense at home and it is working better than I ever thought possible.
      Being able to see basic HTTPS usage data and logs is great!

      Now I want to bump a few hosts at home (Mostly because I have NFI how to install certs on devices at home (Chromecasts, Roku, Kindles, etc)
      Can I have a whitelist for internal IP addresses (my laptop and mobile) that will be bumped (for Blacklist/AV inspection), while all others continue to be spliced (so I can see a summary of who is accessing certain domains).

      In addition to this, I'd also like to exclude certain domains from being bumped (such as when I browse my banking site). Can I also whitelist destination domains

      Finally, I'm not reading many good things about squidguard or [dans/e2]guardian.
      Has anyone used https://www.diladele.com/licensing.html before as the web filter and http://www.squidblacklist.org/ for the blacklist?

      Thanks

      1 Reply Last reply Reply Quote 0
      • S
        sichent Banned
        last edited by

        Hello BluBoy, if you have questions about web safety ask me.

        1 Reply Last reply Reply Quote 0
        • BismarckB
          Bismarck
          last edited by

          This is my running "SSL/MITM Mode: Custom" config:

          # some banking sites that should not be MITM-ed
          acl no_ssl_bump ssl::server_name .mybank.com
          acl no_ssl_bump ssl::server_name .whatsapp.com
          acl no_ssl_bump ssl::server_name .whatsapp.net
          # some source IPs that should not be MITM-ed
          acl splice_only src 10.0.1.7
          acl splice_only src 10.0.1.8
          acl splice_only src 10.0.1.19
          # get SNI obtained by parsing TLS Client Hello during step2
          # (which is instructed by ssl_bump peek step1)
          acl step1 at_step SslBump1
          # no_ssl_bump and splice_only
          ssl_bump peek step1
          ssl_bump splice no_ssl_bump
          ssl_bump splice splice_only
          # bump the rest
          ssl_bump bump all
          
          1 Reply Last reply Reply Quote 0
          • B
            BluBoy
            last edited by

            @sichent:

            Hello BluBoy, if you have questions about web safety ask me.

            You may have already had an email from me.
            The personal usage limit of 7 devices is insanely low. Most households have multiple people, each with multiple devices which would exceed this quite easily.
            I've been very eager to try it, but that limit has prevented me for so long (your support was great, responding extremely quickly with a possible solution. But how many people would go to the effort of querying your license restriction over email?)

            @Bismarck:

            This is my running "SSL/MITM Mode: Custom" config:

            # some banking sites that should not be MITM-ed
            acl no_ssl_bump ssl::server_name .mybank.com
            acl no_ssl_bump ssl::server_name .whatsapp.com
            acl no_ssl_bump ssl::server_name .whatsapp.net
            # some source IPs that should not be MITM-ed
            acl splice_only src 10.0.1.7
            acl splice_only src 10.0.1.8
            acl splice_only src 10.0.1.19
            # get SNI obtained by parsing TLS Client Hello during step2
            # (which is instructed by ssl_bump peek step1)
            acl step1 at_step SslBump1
            # no_ssl_bump and splice_only
            ssl_bump peek step1
            ssl_bump splice no_ssl_bump
            ssl_bump splice splice_only
            # bump the rest
            ssl_bump bump all
            

            This looks like it is exactly what I am after.
            Rather than using URLs, I take it I can feed it a list instead?

            Also, what settings have you used on the configuration page?
            If you are able to, would you mind sharing a screenshot please?

            Thanks!

            1 Reply Last reply Reply Quote 1
            • BismarckB
              Bismarck
              last edited by

              @BluBoy:

              Also, what settings have you used on the configuration page?
              If you are able to, would you mind sharing a screenshot please?

              Thanks!

              Nothing special, just the default settings, screenshot attached. And yes you can extend that list of domains and IPs as you like.

              Maybe good to know:

              https://wiki.squid-cache.org/SquidFaq/WindowsUpdate#Squid_with_SSL-Bump_and_Windows_Updates

              https://docs.diladele.com/faq/squid/index.html

              If you do AV scanning, feed clamav with extra signatures:

              Info: http://sanesecurity.com/usage/signatures/

              Script: https://github.com/extremeshok/clamav-unofficial-sigs

              Cheers!

              sslbump.jpg
              sslbump.jpg_thumb

              1 Reply Last reply Reply Quote 0
              • S
                slim2016
                last edited by

                Thanks, this is worked fine for me

                @Bismarck:

                This is my running "SSL/MITM Mode: Custom" config:

                # some banking sites that should not be MITM-ed
                acl no_ssl_bump ssl::server_name .mybank.com
                acl no_ssl_bump ssl::server_name .whatsapp.com
                acl no_ssl_bump ssl::server_name .whatsapp.net
                # some source IPs that should not be MITM-ed
                acl splice_only src 10.0.1.7
                acl splice_only src 10.0.1.8
                acl splice_only src 10.0.1.19
                # get SNI obtained by parsing TLS Client Hello during step2
                # (which is instructed by ssl_bump peek step1)
                acl step1 at_step SslBump1
                # no_ssl_bump and splice_only
                ssl_bump peek step1
                ssl_bump splice no_ssl_bump
                ssl_bump splice splice_only
                # bump the rest
                ssl_bump bump all
                
                1 Reply Last reply Reply Quote 0
                • G
                  giacomo
                  last edited by

                  Hi All,

                  I'm trying to use your hints on my configuration.
                  I need to put a subnet (e.g. 192.168.0.0/24) with Splice All and all the other traffic with Splice Whitelist, Bump Otherwise.

                  Thank you!

                  1 Reply Last reply Reply Quote 0
                  • S
                    slim2016
                    last edited by

                    @giacomo:

                    Hi All,

                    I'm trying to use your hints on my configuration.
                    I need to put a subnet (e.g. 192.168.0.0/24) with Splice All and all the other traffic with Splice Whitelist, Bump Otherwise.

                    Thank you!

                    Did you try this

                    some banking sites that should not be MITM-ed

                    acl no_ssl_bump ssl::server_name .mybank.com

                    some source IPs that should not be MITM-ed

                    acl splice_only src 192.168.0.0/24

                    get SNI obtained by parsing TLS Client Hello during step2

                    (which is instructed by ssl_bump peek step1)

                    acl step1 at_step SslBump1

                    no_ssl_bump and splice_only

                    ssl_bump peek step1
                    ssl_bump splice no_ssl_bump
                    ssl_bump splice splice_only

                    bump the rest

                    ssl_bump bump all

                    1 Reply Last reply Reply Quote 0
                    • JonathanLeeJ
                      JonathanLee
                      last edited by

                      @bluboy Thank you I used the ACL for a XBOX to splice only so I could still SSL check other devices with certificates

                      Screen Shot 2022-08-17 at 9.49.10 AM.png

                      This way I can cache and check for viruses on my laptop and my son can watch xbox and play games.

                      Make sure to upvote

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.