We are doing the same by the following.
1. At squid.conf :
acl Banned_URLs url_regex -i "/etc/squid/banned_urls.txt"
http_access allow FullTime_DnlUpl !Banned_URLs
2. At The file /etc/squid/banned_urls.txt :
www.xxxxx.com:443
Thankx,
Niladri Mukherjee
IT Deptt.,
M.N.Dastur & Company (P) Ltd., 3rd Floor,
Kolkata, West Bengal.
Ph: 91 33 22250500/5420, Ext: 580
Fax: 91 33 22251422
"Amos Jeffries"
<squid3_at_treenet.c
o.nz> To
"Ali Hardogan"
11/08/2008 05:53 <alihardogan_at_gmail.com>
AM cc
"squid-users"
<squid-users_at_squid-cache.org>
Subject
Re: [squid-users] URL filtering on
HTTPS (transparently)
> Hello,
>
> I'd like to filter URLs used with https, in transparent proxy mode.
>
> I understand that once the HTTPs encrypts the payload between the web
> client and the web server, there is no way to snooping the encrypted
> data without breaking/failing crypto.
> But all I need is to be able to apply blacklisted URLs to the HTTPs
> requests, and the URLs appear in the clear in HTTPS packets (no
> encryption).
>
> Is there any way to achieve that with squid?
> If not, how do people achieve filtering of blacklisted URLs on HTTPs
> traffic transparent to the PCs (no configuration on the PCs allowed)
> -- considering all the other Linux tools?
Squid 3.1 has an SSLBump feature which may be twisted to handle SSL
interception. But we have as yet had no confirmed success with that. It is
designed for standard forward-proxies, so no guarantees.
Other than that very small ray of hope, there is no capability in squid
for intercepting and decrypting of SSL traffic.
What you are attempting to do after all is a middle-man attack on your
customers security systems. It's far better to be open and public about
the proxy. Publish details and get clients to configure it either directly
or via WPAD/PAC.
Amos
Received on Wed Aug 13 2008 - 13:29:40 MDT
This archive was generated by hypermail 2.2.0 : Thu Aug 14 2008 - 12:00:03 MDT