Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Patches update

    Scheduled Pinned Locked Moved Development
    patchsystempatches
    13 Posts 3 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @JonathanLee
      last edited by

      @JonathanLee so you are redirecting to pfsense then?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      JonathanLeeJ 1 Reply Last reply Reply Quote 0
      • JonathanLeeJ
        JonathanLee @michmoor
        last edited by

        @michmoor there is a built in redirecter for blocked urls that is in Squidguard. It's inside of pfSense

        Make sure to upvote

        M 1 Reply Last reply Reply Quote 1
        • M
          michmoor LAYER 8 Rebel Alliance @JonathanLee
          last edited by michmoor

          @JonathanLee Ive been using the 'ext url found (enter URL) option. I have an instance of Apache stood up

          What option are you using? Im asking because if you select internal then pfsense serves the page but you need to allow access to the management port (443) which isnt a good option .

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          1 Reply Last reply Reply Quote 0
          • M
            mcury
            last edited by

            As far as I remember, those redirects always worked.
            But they won't work for HTTPS since the domain blocked does not match the certificate presented by squidguard, thus the browser will prompt that error.

            dead on arrival, nowhere to be found.

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @mcury
              last edited by michmoor

              @mcury
              If you use an external redirect which is what i do then http or https blocks dont matter as its being sent to my web server which is listening on port 80.
              I just didnt want a dependency on something outside the pfsense box but its the only preferrable solution i can think of.

              So for exampleanything matching my squidguard block gets sent to http://netadmin/info.php?url=403&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u

              netadmin = locally hosted web server

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              M 1 Reply Last reply Reply Quote 0
              • M
                mcury @michmoor
                last edited by

                @michmoor said in Patches update:

                If you use an external redirect which is what i do then http or https blocks dont matter as its being sent to my web server which is listening on port 80.
                I just didnt want a dependency on something outside the pfsense box but its the only preferrable solution i can think of.

                I don't see how a browser would allow that without showing a certificate error.
                If you request a https URL, the browser is expecting the domain to match with the certificate, this is how SSL works.
                Did you disable something in the browser for that to work ?

                Are you using bump or splice option ?

                dead on arrival, nowhere to be found.

                M 1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @mcury
                  last edited by michmoor

                  @mcury It works.
                  I am blocking .pdfs as a test.

                  Setting:

                  0626dbe9-78da-49e9-982e-83634c3e5213-image.png

                  Block
                  4f25500f-0023-4f6a-9753-cf5d55108d17-image.png

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  M 1 Reply Last reply Reply Quote 2
                  • M
                    mcury @michmoor
                    last edited by

                    @michmoor Hm, so you are using Squid-in-the-middle SSL, bump SSL, mimicking the SSL on the demand.. Imported the certificate to the hosts. Ok then, thanks @michmoor.

                    dead on arrival, nowhere to be found.

                    M 1 Reply Last reply Reply Quote 0
                    • M
                      michmoor LAYER 8 Rebel Alliance @mcury
                      last edited by

                      @mcury Yep. Sorry if that wasnt clear.
                      I am doing full MITM.

                      If you rely only on the internal redirect then pfsense points back to itself on the management port (firewall.example.com:443) .
                      The problem of course is that in order to serve the page you must make your management port accessible to all LAN clients. That means making management accessible to all LAN clients. The only workaround is to use an external webserver that has php code on it to interrupt whats being sent to it from pfsense

                      Firewall: NetGate,Palo Alto-VM,Juniper SRX
                      Routing: Juniper, Arista, Cisco
                      Switching: Juniper, Arista, Cisco
                      Wireless: Unifi, Aruba IAP
                      JNCIP,CCNP Enterprise

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        mcury @michmoor
                        last edited by

                        @michmoor said in Patches update:

                        Yep. Sorry if that wasnt clear.
                        I am doing full MITM.

                        Np, I was just trying to understand :)

                        @michmoor said in Patches update:

                        If you rely only on the internal redirect then pfsense points back to itself on the management port (firewall.example.com:443) .
                        The problem of course is that in order to serve the page you must make your management port accessible to all LAN clients. That means making management accessible to all LAN clients. The only workaround is to use an external webserver that has php code on it to interrupt whats being sent to it from pfsense

                        Now I see what you meant, yes, indeed that would be a problem.. Using an external server for that solves this problem.

                        dead on arrival, nowhere to be found.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.