Forgot to attach the config file root@proxy01:~# cat /etc/squid3/ssl.conf # Squid 5.x branch # SSL used for port ID 1, :3128 on # Patch 2020 - 08 - 03 SquidMikrotikEnabled = 0 # SSL Proxy options Proxy version:5.7 [146] sslcrtd_program /lib/squid3/security_file_certgen -s /media/squidtmpfs/ssl/ssl_db -M 64MB sslcrtd_children 32 startup=5 idle=1 queue-size=64 acl AnnotateSSLGBW2 annotate_transaction whitelistssl=yes #The AppStore application in IOS (iPhone, iPad, MacOS) uses SSL Certificate Pinning, #it means the application knows what certificate to expect when accessing AppStore. #When you enable SSL Bump of HTTPS connections Squid replaces the default certificate with a ‘mimicked’ one; #the application detects that and refuses to function. # acl FakeCert ssl::server_name .apple.com acl FakeCert ssl::server_name .icloud.com acl FakeCert ssl::server_name .mzstatic.com acl FakeCert ssl::server_name .dropbox.com acl FakeCert ssl::server_name .bnpparisbas acl SSLInternalNets dst 10.0.0.0/8 acl SSLInternalNets dst 172.16.0.0/12 acl SSLInternalNets dst 192.168.0.0/16 acl ssl_step1 at_step SslBump1 acl ssl_step2 at_step SslBump2 acl ssl_step3 at_step SslBump3 include /etc/squid3/ssl_whitelist.conf ssl_bump peek ssl_step1 acl GlobalWhitelistDSTNet dst "/etc/squid3/acls_whitelist.dst.conf" ssl_bump splice GlobalWhitelistDSTNet AnnotateSSLGBW2 ssl_bump splice ByPassRBL AnnotateSSLGBW2 ssl_bump splice SSLInternalNets AnnotateSSLGBW2 ssl_bump splice FakeCert AnnotateSSLGBW2 # IMPRIM_RULE:5 ssl_bump splice ByPassRBL AnnotateSSLGBW2 ssl_bump splice GlobalWhitelistDSTNet AnnotateSSLGBW2 # Rules (spliced) added by admins.... # 5 rules... # -------------- Personal rules ----------------- # id:5 # decrypt_cnn order:0 acl AnnotateSSLW5 annotate_transaction bumprule=5 ssl_bump bump Group26 AnnotateSSLW5 ssl_bump splice all tls_outgoing_options options=NO_SSLv3,NO_TICKET cipher=ALL:!SSLv2:!SSLv3:!ADH:!DSS:!MD5:!EXP:!DES:!PSK:!SRP:!RC4:!IDEA:!SEED:!aNULL:!eNULL flags=DONT_VERIFY_PEER sslproxy_cert_error allow all on_unsupported_protocol tunnel all -----Mensagem original----- De: squid-users <squid-users-bounces@xxxxxxxxxxxxxxxxxxxxx> Em Nome De andre.bolinhas@xxxxxxxxxxxxxx Enviada: 12 de janeiro de 2023 21:03 Para: 'Amos Jeffries' <squid3@xxxxxxxxxxxxx>; squid-users@xxxxxxxxxxxxxxxxxxxxx Assunto: Re: SSLBUMP for specific domains Hi Amos Thansk for your quick reply, I have done it as example but now, even the internet surf is ok for all website I get to many TCP_TUNNEL/500 on access.log for all websites that we are not decrypting 1673531433.924 31315 192.168.60.30 TCP_TUNNEL/500 4096 CONNECT sapo.pt:443 - HIER_DIRECT/213.13.146.142:443 - mac="d6:8b:66:2a:9b:92" accessrule:%20ntlm_white_dstdomain%0D%0Awebfilter:%20pass%0D%0Acategory:%203%0D%0Acategory-name:%20Society%0D%0Aclog:%20cinfo:3-Society;%0D%0A exterr="-|- splice" 1673531433.933 31324 192.168.60.30 TCP_TUNNEL/500 4695 CONNECT sapo.pt:443 - HIER_DIRECT/213.13.146.142:443 - mac="d6:8b:66:2a:9b:92" accessrule:%20ntlm_white_dstdomain%0D%0Awebfilter:%20pass%0D%0Acategory:%203%0D%0Acategory-name:%20Society%0D%0Aclog:%20cinfo:3-Society;%0D%0A exterr="-|- splice" 1673531437.798 35024 192.168.60.30 TCP_TUNNEL/500 76572 CONNECT www.sapo.pt:443 - HIER_DIRECT/213.13.146.142:443 - mac="d6:8b:66:2a:9b:92" accessrule:%20ntlm_white_dstdomain%0D%0Awebfilter:%20pass%0D%0Acategory:%203%0D%0Acategory-name:%20Society%0D%0Aclog:%20cinfo:3-Society;%0D%0A exterr="-|- splice" -----Mensagem original----- De: squid-users <squid-users-bounces@xxxxxxxxxxxxxxxxxxxxx> Em Nome De Amos Jeffries Enviada: 12 de janeiro de 2023 19:13 Para: squid-users@xxxxxxxxxxxxxxxxxxxxx Assunto: Re: SSLBUMP for specific domains On 13/01/2023 6:37 am, andre.bolinhas wrote: > > Hi > > It’s possible configure squid to intercept ssl traffic just for a > group of domain and leave the all of rest out of ssl interceptation? > Yes, with one caveat: that Squid is able to identify the domain/server to make the decision. > If so, can you send me an example of config? > > I have try search for this on Google and in forums but I just find > config to intercept all. > You will find a simple example here: <https://wiki.squid-cache.org/Features/SslPeekAndSplice#peek-at-sni-and-bump> Amos _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users