-
Notifications
You must be signed in to change notification settings - Fork 596
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Squid - implement SSL MITM mode options #269
Conversation
This implements a couple of options for configuring SSL MITM interception, as discussed @ https://forum.pfsense.org/index.php?topic=123461.0 - Splice Whitelist, Bump Otherwise This is the current code, still used by default. - Splice All Will splice everything. No need to install CA certificate on clients, and lets SquidGuard do its job. - Custom Use advanced custom options. Tinker with it as you wish. Unsupported, if you break it, fix it yourself. Tweak a couple of descriptions and fix some tags while here.
This implements a couple of options for configuring SSL MITM interception, as discussed @ https://forum.pfsense.org/index.php?topic=123461.0 - Splice Whitelist, Bump Otherwise This is the current code, still used by default. - Splice All Will splice everything. No need to install CA certificate on clients, and lets SquidGuard do its job. - Custom Use advanced custom options. Tinker with it as you wish. Unsupported, if you break it, fix it yourself. Tweak a couple of comments while here.
<custom_php_after_form_command> | ||
squid_print_javascript_general2(); | ||
</custom_php_after_form_command> | ||
--> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the idea about adding this commented out code here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well the idea is getting some JS magic there as in Antivirus/Authentication tab, but it's
- not ready yet
- mostly unrelated to this change
- not compatible with RELENG_2_3_2 in case someone decides to cherrypick this to that branch
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Works nicely, thanks!
@jim-p Thanks for testing. Now, if only someone fixed/rewrote the SquidGuard thing. :/ I gave up everytime after 5 minutes. |
I agree, re: SquidGuard. Every time I have to touch that code it makes my brain hurt, and that's just from the whitespace and formatting. |
Patch release with miscellaneous bug/doc/build fixes. Excerpt from release tag: [#269] fix memory leak in V3fArrayFromBuffer [#268] Add <cstdint> for int64_t [#263] Initialize x in testRoots.cpp:solve() to suppress compiler warning [#262] Fix gcc compiler warning in testFun.cpp [#261] Test return value of extractSHRT to avoid uninitialized reference [#260] Fix example code so it compiles as is [#259] Cuda safety in several headers [#256] Fix markdown and typos in README.md [#255] Do not warn if half.h has already being included [#248] Update sphinx version ChangeLog: https://github.com/AcademySoftwareFoundation/Imath/releases/tag/v3.1.6 MFH: 2022Q4
ChangeLog: https://www.nlnetlabs.nl/news/2023/Jun/07/nsd-4.7.0-released/ 4.7.0 ================ FEATURES: - Merge #263: Add bash autocompletion script for nsd-control. - Fix #267: Allow unencrypted local operation of nsd-control. - Merge #269 from Fale: Add systemd service unit. - Fix #271: DNSTAP over TCP, with dnstap-ip: "127.0.0.1@3333". - dnstap over TLS, default enabled. Configured with the options dnstap-tls, dnstap-tls-server-name, dnstap-tls-cert-bundle, dnstap-tls-client-key-file and dnstap-tls-client-cert-file. BUG FIXES: - Fix #239: -Wincompatible-pointer-types warning in remote.c. - Fix configure for -Wstrict-prototypes. - Fix #262: Zone(s) not synchronizing properly via TLS. - Fix for #262: More error logging for SSL read failures for zone transfers. - Merge #265: Fix C99 compatibility issue. - Fix #266: Fix build with --without-ssl. - Fix for #267: neater variable definitions. - Fix #270: reserved identifier violation. - Fix to clean more memory on exit of dnstap collector. - Fix dnstap to not check socket path when using IP address. - Fix to compile without ssl with dnstap-tls code. - Dnstap tls code fixes. - Fix include brackets for ssl.h include statements, instead of quotes. - Fix static analyzer warning about nsd_event_method initialization. - Fix #273: Large TXT record breaks AXFR. - Fix ixfr create from adding too many record types. - Fix cirrus script for submit to coverity scan to libtoolize the configure script components config.guess and config.sub. - Fix readme status badge links. - make depend. - Fix for build to run flex and bison before compiling code that needs the headers. - Fix to remove unused whitespace from acx_nlnetlabs.m4 and config.h. - For #279: Note that autoreconf -fi creates the configure script and also the needed auxiliary files, for autoconf 2.69 and 2.71. - Fix unused variable warning in unit test, from clang compile. - Fix #240: Prefix messages originating from verifier. - Fix #275: Drop unnecessary root server checks. PR: 272096 Reported by: [email protected] (maintainer)
This implements a couple of options for configuring SSL MITM interception, as discussed @ https://forum.pfsense.org/index.php?topic=123461.0
This is the current code, still used by default.
Will splice everything. No need to install CA certificate on clients, and lets SquidGuard do its job. No content filtering (AV) possible, obviously.
Use advanced custom options. Tinker with it as you wish. Unsupported, if you break it, fix it yourself.
Tweak a couple of descriptions/comments and fix some tags while here.