On 13/01/2023 10:04 am, andre.bolinhas wrote:
Forgot to attach the config file
root@proxy01:~# cat /etc/squid3/ssl.conf
# Squid 5.x branch
# SSL used for port ID 1, :3128 on
# Patch 2020 - 08 - 03 SquidMikrotikEnabled = 0
# SSL Proxy options Proxy version:5.7 [146]
sslcrtd_program /lib/squid3/security_file_certgen -s
/media/squidtmpfs/ssl/ssl_db -M 64MB
sslcrtd_children 32 startup=5 idle=1 queue-size=64
acl AnnotateSSLGBW2 annotate_transaction whitelistssl=yes
#The AppStore application in IOS (iPhone, iPad, MacOS) uses SSL Certificate
Pinning,
#it means the application knows what certificate to expect when accessing
AppStore.
#When you enable SSL Bump of HTTPS connections Squid replaces the default
certificate with a ‘mimicked’ one;
#the application detects that and refuses to function.
#
acl FakeCert ssl::server_name .apple.com
acl FakeCert ssl::server_name .icloud.com
acl FakeCert ssl::server_name .mzstatic.com
acl FakeCert ssl::server_name .dropbox.com
acl FakeCert ssl::server_name .bnpparisbas
acl SSLInternalNets dst 10.0.0.0/8
acl SSLInternalNets dst 172.16.0.0/12
acl SSLInternalNets dst 192.168.0.0/16
acl ssl_step1 at_step SslBump1
acl ssl_step2 at_step SslBump2
acl ssl_step3 at_step SslBump3
include /etc/squid3/ssl_whitelist.conf
ssl_bump peek ssl_step1
acl GlobalWhitelistDSTNet dst "/etc/squid3/acls_whitelist.dst.conf"
ssl_bump splice GlobalWhitelistDSTNet AnnotateSSLGBW2
ssl_bump splice ByPassRBL AnnotateSSLGBW2
ssl_bump splice SSLInternalNets AnnotateSSLGBW2
ssl_bump splice FakeCert AnnotateSSLGBW2
# IMPRIM_RULE:5
ssl_bump splice ByPassRBL AnnotateSSLGBW2
ssl_bump splice GlobalWhitelistDSTNet AnnotateSSLGBW2
FYI, Those two lines are duplicates of the first ssl_bump rules. They do
nothing here except waste CPU cycles.
# Rules (spliced) added by admins....
# 5 rules...
# -------------- Personal rules -----------------
# id:5
# decrypt_cnn order:0
acl AnnotateSSLW5 annotate_transaction bumprule=5
ssl_bump bump Group26 AnnotateSSLW5
ssl_bump splice all
tls_outgoing_options options=NO_SSLv3,NO_TICKET
cipher=ALL:!SSLv2:!SSLv3:!ADH:!DSS:!MD5:!EXP:!DES:!PSK:!SRP:!RC4:!IDEA:!SEED:!aNULL:!eNULL
flags=DONT_VERIFY_PEER
sslproxy_cert_error allow all
on_unsupported_protocol tunnel all
-----Mensagem original-----
De: squid-users Em Nome De andre.bolinhas
Enviada: 12 de janeiro de 2023 21:03
Assunto: Re: [squid-users] SSLBUMP for specific domains
Hi Amos
Thansk for your quick reply, I have done it as example but now, even the
internet surf is ok for all website I get to many TCP_TUNNEL/500 on access.log
for all websites that we are not decrypting
1673531433.924 31315 192.168.60.30 TCP_TUNNEL/500 4096 CONNECT sapo.pt:443 -
HIER_DIRECT/213.13.146.142:443 - mac="d6:8b:66:2a:9b:92"
accessrule:%20ntlm_white_dstdomain%0D%0Awebfilter:%20pass%0D%0Acategory:%203%0D%0Acategory-name:%20Society%0D%0Aclog:%20cinfo:3-Society;%0D%0A
exterr="-|- splice"
1673531433.933 31324 192.168.60.30 TCP_TUNNEL/500 4695 CONNECT sapo.pt:443 -
HIER_DIRECT/213.13.146.142:443 - mac="d6:8b:66:2a:9b:92"
accessrule:%20ntlm_white_dstdomain%0D%0Awebfilter:%20pass%0D%0Acategory:%203%0D%0Acategory-name:%20Society%0D%0Aclog:%20cinfo:3-Society;%0D%0A
exterr="-|- splice"
1673531437.798 35024 192.168.60.30 TCP_TUNNEL/500 76572 CONNECT www.sapo.pt:443 -
HIER_DIRECT/213.13.146.142:443 - mac="d6:8b:66:2a:9b:92"
accessrule:%20ntlm_white_dstdomain%0D%0Awebfilter:%20pass%0D%0Acategory:%203%0D%0Acategory-name:%20Society%0D%0Aclog:%20cinfo:3-Society;%0D%0A
exterr="-|- splice"
By the differences on size and the existence of a remote server IP
address in the log entry, I guess this is
<https://bugs.squid-cache.org/show_bug.cgi?id=5252>.
Amos
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users