Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Squid (not transparent) bypasses firewall

    Scheduled Pinned Locked Moved Firewalling
    3 Posts 1 Posters 587 Views 1 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      AWeidner
      last edited by AWeidner

      System:

      • pfSense 2.6.0
      • LAN 192.168.1.0/24 (bridge0, openvpn tap and LAN interface)
      • Squid is listening on LAN interface and port 3128

      Problem:
      Squid is accessible from LAN net though no explicit rule is in place. I would have expected to have to set a rule for clients to access squid. Just like i have to, if i want to access the pfSense web interface with the Anti Lockout rule disabled.

      If i enter pfctl -sr into the commandline, i can see two rules at the bottom:

      pass in quick on bridge0 proto tcp from any to (bridge0) port = 3128 flags S/SA keep state
      pass in quick on bridge0 proto tcp from any to (bridge0) port = 3129 flags S/SA keep state
      

      Where do they come from and how do i do restrict access to squid for specific IP addresses?

      1 Reply Last reply Reply Quote 0
      • A Offline
        AWeidner
        last edited by

        Just to clarify, was a bit unclear in my first post (but cannot edit it anymore):

        System:

        • pfSense 2.6.0 / APU2C4
        • igb0: WAN
        • igb1: LAN (no ip address and/or firewall rules associated)
        • bridge0 (igb1 and OpenVPN tap): 192.168.1.1/24
        • bridge0 has firewall rules for accessing the pfSense gui from bridge0-net
        • Squid is listening on bridge0 / port 3128

        Problem:

        • Squid is accessible from the bridge0-net though no rule allowing that is in place.
        • i have to set a rule to access the pfSense gui from bridge0-net though (and everything else for that matter)

        If i enter pfctl -sr into the commandline, i can see two rules at the bottom:

        pass in quick on bridge0 proto tcp from any to (bridge0) port = 3128 flags S/SA keep state
        pass in quick on bridge0 proto tcp from any to (bridge0) port = 3129 flags S/SA keep state
        

        Where do they come from and how do i do restrict access to squid for specific IP addresses?

        A 1 Reply Last reply Reply Quote 0
        • A Offline
          AWeidner @AWeidner
          last edited by AWeidner

          To answer my own question:
          "Allow users on interface" in the "General" tab of squid is checked by default. If you remove that setting, you have to create rules to allow users to access the proxy server.

          I should have paid closer attention to the settings.

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.