Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Squid gone now what

    Scheduled Pinned Locked Moved General pfSense Questions
    17 Posts 5 Posters 2.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance
      last edited by

      Hello everyone,
      Just curious as to what everyones alternative application or way of doing things will be now that Squid is deprecated within pfSense.
      I think it's a great thing and was a great learning opportunity when I was starting out trying to understand this whole MITM thing. Fun rabbit hole i went down.

      So what's the best way of doing content inspection now? How do we now do selective control of website access for users?

      Overall, really good thing this is happening just sad to see one of my favorite projects die ๐Ÿ˜ž

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      S 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @michmoor
        last edited by

        @michmoor Huh, don't use it so hadn't see that message.

        This may not be what you're looking for but in the spirit of brainstorming, some options might be:

        • endpoint security via HTTPS inspection or URL blocking (we use Bitdefender for our MSP clients)
        • DNS based blocking (various services on endpoints, or pfBlockerNG, or "anti-malware" or "family friendly" DNS, or DNS overrides, and block DoH/DoT)
        • for kids, parental controls (e.g. Edge on Windows, iOS)

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote ๐Ÿ‘ helpful posts!

        M 1 Reply Last reply Reply Quote 0
        • M
          michmoor LAYER 8 Rebel Alliance @SteveITS
          last edited by

          @SteveITS
          Yep.
          For the majority of our clients we use Sophos endpoint.
          I was thinking more for home lab/personal use. pfSense Squid was great as it acted on the whole network instead of an individual machine basis.
          My only problem with DNS Blocklist is hunting for a good blocklist and applying it on a per user/vlan basis.

          But yeah this post is more for brainstorming. Im all open for ideas. Squid was really flexible when i needed something done for a specific group of users.

          Firewall: NetGate,Palo Alto-VM,Juniper SRX
          Routing: Juniper, Arista, Cisco
          Switching: Juniper, Arista, Cisco
          Wireless: Unifi, Aruba IAP
          JNCIP,CCNP Enterprise

          S 1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Mmm, DNS blocking has worked well for me for some years now. Squid has almost always been more trouble than it's worth IMO.

            M 2 Replies Last reply Reply Quote 1
            • S
              SteveITS Galactic Empire @michmoor
              last edited by

              @michmoor You could probably NAT some clients to specific DNS servers. Like this but out to Quad9 or whatever, or vice versa:
              https://docs.netgate.com/pfsense/en/latest/recipes/dns-redirect.html

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote ๐Ÿ‘ helpful posts!

              1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @stephenw10
                last edited by

                @stephenw10 said in Squid gone now what:

                DNS blocking has worked well for me for some years now.

                Whats your strategy of doing per-user or per-vlan dns blocking? A common scenario i see on Reddit are people who want to do filtering on a Kids_VLAN.

                @SteveITS said in Squid gone now what:

                You could probably NAT some clients to specific DNS servers

                Thats actually a really good idea Steve, i cant believe i didnt think about it. Certain devices could get redirected to a DNS server of my choice.....Huh..why am i now thinking of interesting possibilities here? hehe

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                1 Reply Last reply Reply Quote 0
                • M
                  michmoor LAYER 8 Rebel Alliance @stephenw10
                  last edited by

                  @stephenw10 said in Squid gone now what:

                  Squid has almost always been more trouble than it's worth IMO.

                  You're not a fan of websites that stopped working and browser updates breaking proxy configs? Those were fun.
                  I shall miss them.....

                  Firewall: NetGate,Palo Alto-VM,Juniper SRX
                  Routing: Juniper, Arista, Cisco
                  Switching: Juniper, Arista, Cisco
                  Wireless: Unifi, Aruba IAP
                  JNCIP,CCNP Enterprise

                  1 Reply Last reply Reply Quote 1
                  • JonathanLeeJ
                    JonathanLee
                    last edited by JonathanLee

                    Maybe run OpenSense on your equipment that way you get proxy use back. That firewall has https web proxy software, plus it's a fork of PfSense. QUIC https3 DoH, DNS based filtering has a number of issues also.

                    Or have an external Proxy server that runs Squid still, Squid's next update is in 2025.

                    Make sure to upvote

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Though they are also running Squid and even the latest version still has known security issues.

                      M 1 Reply Last reply Reply Quote 1
                      • M
                        michmoor LAYER 8 Rebel Alliance @stephenw10
                        last edited by

                        @stephenw10
                        correct on this. There is no where to run metaphorically speaking. Iโ€™d imagine the opnsense dev team will make the choice to drop the package as well.
                        Enterprise security vendors Iโ€™d imagine also run some version of squid but they are a black box and highly customized so they may not have the same concerns.
                        That being the case if you really want some forward proxy in your setup you have to look at proprietary security vendor appliances but those have a much higher TCO.

                        Firewall: NetGate,Palo Alto-VM,Juniper SRX
                        Routing: Juniper, Arista, Cisco
                        Switching: Juniper, Arista, Cisco
                        Wireless: Unifi, Aruba IAP
                        JNCIP,CCNP Enterprise

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          mcury @michmoor
                          last edited by

                          As I see it, pfblockerNG is almost there.
                          You can block everything you want, what lacks for me is the possibility to have different policies for different groups.

                          It would be nice to see an implementation such as you could associate users IP addresses with different block lists/groups.

                          That would be perfect, but I don't know if that is feasible taking in consideration the coding behind it.

                          dead on arrival, nowhere to be found.

                          stephenw10S 1 Reply Last reply Reply Quote 1
                          • JonathanLeeJ
                            JonathanLee
                            last edited by JonathanLee

                            I purchased my SG-2100 to learn about Proxy use with SSL intercept and certificates. It took for ever, from 2019 on to get it to work correctly. I actually paid for this with us dollars. Unreal, it was advertised as a fictional item had so many issues. I have the air let out of my tires right now. I paided for this. Unreal. Some users downloaded this stuff for free, I am a paid user, that had all these issues from the get go and now the packages are depreciated after it started working correctly. It's sad. DNS versions don't work, they bypass the DNS with DoH or https3 dns. It has many issues too.

                            Just frustrated.
                            It's alright it was for educational purposes. And I learned a lot about proxies. Thank you for all you do.

                            Make sure to upvote

                            M S 2 Replies Last reply Reply Quote 0
                            • M
                              michmoor LAYER 8 Rebel Alliance @JonathanLee
                              last edited by

                              @JonathanLee
                              I understand your frustration completely.
                              I would've preferred a drop-in replacement if available.
                              Its still being advertised weirdly enough - https://www.netgate.com/pfsense-plus-applications/content-filtering

                              This does effectively removes the ability to provide any per-user filtering on the platform null. If you really need it (and there are plenty of valid reasons to need it) you will need to explore other vendors.

                              Firewall: NetGate,Palo Alto-VM,Juniper SRX
                              Routing: Juniper, Arista, Cisco
                              Switching: Juniper, Arista, Cisco
                              Wireless: Unifi, Aruba IAP
                              JNCIP,CCNP Enterprise

                              M 1 Reply Last reply Reply Quote 1
                              • M
                                michmoor LAYER 8 Rebel Alliance @michmoor
                                last edited by michmoor

                                Good feedback here:
                                https://forum.opnsense.org/index.php?topic=36914.msg180743#msg180743

                                IMO, this is a better way of handling the Squid vuln issue. Still make it available but provide clear and proper warning during install.
                                There are still many valid use cases for Squid when running a network. How do i know? Because its still being advertised on Netgates site - https://www.netgate.com/pfsense-plus-applications/content-filtering

                                So for all the reasons listed on the website is all the reasons Squid should be made available in the repo.
                                Just provide proper notice when installing it and also issue a warning banner similar to what the ISC to KEA warning banner is doing.

                                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                                Routing: Juniper, Arista, Cisco
                                Switching: Juniper, Arista, Cisco
                                Wireless: Unifi, Aruba IAP
                                JNCIP,CCNP Enterprise

                                JonathanLeeJ 1 Reply Last reply Reply Quote 2
                                • stephenw10S
                                  stephenw10 Netgate Administrator @mcury
                                  last edited by

                                  @mcury Yes. That should be possible using views in Unbound ๐Ÿค” Though I'm not sure what implications that might have for memory use etc.

                                  1 Reply Last reply Reply Quote 1
                                  • JonathanLeeJ
                                    JonathanLee @michmoor
                                    last edited by

                                    @michmoor YES!!! Clear warning to end users and still have available PLEASE!!!!

                                    Make sure to upvote

                                    1 Reply Last reply Reply Quote 2
                                    • S
                                      SteveITS Galactic Empire @JonathanLee
                                      last edited by

                                      @JonathanLee said in Squid gone now what:

                                      DNS versions don't work, they bypass the DNS with DoH or https3 dns

                                      Long/detailed doc on how to block those:
                                      https://jpgpi250.github.io/piholemanual/doc/Block%20DOH%20with%20pfsense.pdf
                                      from:
                                      https://jpgpi250.github.io/piholemanual/

                                      Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                      When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                      Upvote ๐Ÿ‘ helpful posts!

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.