История изменений
Исправление Spider55, (текущая версия) :
Конфиг сквида огромен. Что именно?
# declare acls
acl step1 at_step SslBump1
acl step2 at_step SslBump2
acl step3 at_step SslBump3
# exclude by detected categories or disabled ssl filter in policy,.
# works in explicit proxy deployment only by adding a special "X-SSL-Bump: skip" header to CONNECT request
acl ssl_skip_bump req_header X-SSL-Bump -i skip
# force sslbump to enable postponed blocking of CONNECT tunnels, works in explicit proxy deployment only.
# by adding a special "X-SSL-Bump: force" header to CONNECT request
acl ssl_force_bump req_header X-SSL-Bump -i force
# connections from localhost/127.0.0.1 to the proxy is never bumped
ssl_bump splice localhost
#
# ok NOW come the SSL peek-and-splice rules, ORDER IS IMPORTANT!!!
#
# skip SSL bump in both all and targeted mode
ssl_bump splice ssl_skip_bump
# peek at SNI the client sent to us
ssl_bump peek step1 all
# force bump in both all and targeted mode
ssl_bump bump ssl_force_bump
# schedule list start
# schedule list end
# advanced exclude acls
include "/opt/websafety/etc/squid/ssl/exclude/advanced.conf"
# now see what SSL filtering mode we are in
# sslbump mode - all, so take a look at server certificate
ssl_bump stare step2 all
# and decrypt all connections
ssl_bump bump al
И версия
squid -v
Squid Cache: Version 4.9
Service Name: squid
Debian linux
This binary uses OpenSSL 1.1.1d 10 Sep 2019. For legal restrictions on distribution see https://www.openssl.org/source/license.html
configure options: '--build=x86_64-linux-gnu' '--prefix=/usr' '--includedir=${prefix}/include' '--mandir=${prefix}/share/man' '--infodir=${prefix}/share/info' '--sysconfdir=/etc' '--localstatedir=/var' '--libexecdir=${prefix}/lib/squid' '--srcdir=.' '--disable-maintainer-mode' '--disable-dependency-tracking' '--disable-silent-rules' 'BUILDCXXFLAGS=-g -O2 -fdebug-prefix-map=/home/spider/src/build/squid/squid-4.9=. -fstack-protector-strong -Wformat -Werror=format-security -Wdate-time -D_FORTIFY_SOURCE=2 -Wl,-z,relro -Wl,-z,now -Wl,--as-needed' 'BUILDCXX=g++' '--with-build-environment=default' '--enable-build-info=Debian linux' '--datadir=/usr/share/squid' '--sysconfdir=/etc/squid' '--libexecdir=/usr/lib/squid' '--mandir=/usr/share/man' '--enable-inline' '--disable-arch-native' '--enable-async-io=8' '--enable-storeio=ufs,aufs,diskd,rock' '--enable-removal-policies=lru,heap' '--enable-delay-pools' '--enable-cache-digests' '--enable-icap-client' '--enable-ssl' '--enable-ssl-crtd' '--with-openssl' '--enable-follow-x-forwarded-for' '--enable-auth-basic=DB,fake,getpwnam,LDAP,NCSA,NIS,PAM,POP3,RADIUS,SASL,SMB' '--enable-auth-digest=file,LDAP' '--enable-auth-negotiate=kerberos,wrapper' '--enable-auth-ntlm=fake,SMB_LM' '--enable-external-acl-helpers=file_userip,kerberos_ldap_group,LDAP_group,session,SQL_session,time_quota,unix_group,wbinfo_group' '--enable-security-cert-validators=fake' '--enable-storeid-rewrite-helpers=file' '--enable-url-rewrite-helpers=fake' '--enable-eui' '--enable-esi' '--enable-icmp' '--enable-zph-qos' '--enable-ecap' '--disable-translation' '--with-swapdir=/var/spool/squid' '--with-logdir=/var/log/squid' '--with-pidfile=/var/run/squid.pid' '--with-filedescriptors=65536' '--with-large-files' '--with-default-user=proxy' '--with-gnutls' '--enable-linux-netfilter' 'build_alias=x86_64-linux-gnu' 'CFLAGS=-g -O2 -fdebug-prefix-map=/home/spider/src/build/squid/squid-4.9=. -fstack-protector-strong -Wformat -Werror=format-security -Wall' 'LDFLAGS=-Wl,-z,relro -Wl,-z,now -Wl,--as-needed' 'CPPFLAGS=-Wdate-time -D_FORTIFY_SOURCE=2' 'CXXFLAGS=-g -O2 -fdebug-prefix-map=/home/spider/src/build/squid/squid-4.9=. -fstack-protector-strong -Wformat -Werror=format-security'
собирал пакет из исходников родных для Debian т.к. родной сквид идёт без transparent ssl
Исходная версия Spider55, :
Конфиг сквида огромен. Что именно?
# declare acls
acl step1 at_step SslBump1
acl step2 at_step SslBump2
acl step3 at_step SslBump3
# exclude by detected categories or disabled ssl filter in policy,.
# works in explicit proxy deployment only by adding a special "X-SSL-Bump: skip" header to CONNECT request
acl ssl_skip_bump req_header X-SSL-Bump -i skip
# force sslbump to enable postponed blocking of CONNECT tunnels, works in explicit proxy deployment only.
# by adding a special "X-SSL-Bump: force" header to CONNECT request
acl ssl_force_bump req_header X-SSL-Bump -i force
# connections from localhost/127.0.0.1 to the proxy is never bumped
ssl_bump splice localhost
#
# ok NOW come the SSL peek-and-splice rules, ORDER IS IMPORTANT!!!
#
# skip SSL bump in both all and targeted mode
ssl_bump splice ssl_skip_bump
# peek at SNI the client sent to us
ssl_bump peek step1 all
# force bump in both all and targeted mode
ssl_bump bump ssl_force_bump
# schedule list start
# schedule list end
# advanced exclude acls
include "/opt/websafety/etc/squid/ssl/exclude/advanced.conf"
# now see what SSL filtering mode we are in
# sslbump mode - all, so take a look at server certificate
ssl_bump stare step2 all
# and decrypt all connections
ssl_bump bump al