• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Decrypt https traffic for IDS/IPS via proxy

Scheduled Pinned Locked Moved IDS/IPS
3 Posts 3 Posters 820 Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • O
    oddstan
    last edited by Mar 18, 2021, 11:05 AM

    Is it possible to set up a (single) pfsense server so that suricata would receive unencrypted traffic to do its job?
    E.g.
    Internet (https) - Squid (decrypt, http) - Suricata (analise drop/block/pass) - Squid (encrypt/https) - Client
    If yes could you plz share what settings might be for such setup.

    Many thanks.

    1 Reply Last reply Reply Quote 0
    • B
      bmeeks
      last edited by Mar 18, 2021, 1:08 PM

      On a single server, I don't think so. This is because Suricata attaches directly to the physical NIC such that traffic entering the box from the NIC first goes to Suricata before it goes anywhere else.

      If you have a box with multiple physical NIC ports, I guess it would be possible to set up a complex set of bridges so that traffic came in one port, went to squid/proxy, was sent out another port that Suricata was listening on, then came back from Suricata into a different physical port to get bridged to the output (or to the firewall). Lots of complexity and plenty of places things could break with a setup like that. There is no way to do this with pfSense and the GUI package, though. This would require you to install and configure the CLI version of Suricata and the other packages.

      G 1 Reply Last reply Mar 18, 2021, 1:46 PM Reply Quote 1
      • G
        Gertjan @bmeeks
        last edited by Gertjan Mar 18, 2021, 1:49 PM Mar 18, 2021, 1:46 PM

        Added to that : for all this to work, you have to install certs on every client device, certs being used so that client device can use and trust pfSense as a proxy, so pfSense can do the real MITM job.

        All this, on paper, is pure dynamite. In reality, its far better then that.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 1
        1 out of 3
        • First post
          1/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          This community forum collects and processes your personal information.
          consent.not_received