Hello Mike,

Access to ICAP is controlled with same looking acls as access to anything else. 
Something like:

icap_enable on
icap_service qlproxy1 reqmod_precache bypass=0 icap://127.0.0.1:1344/reqmod
icap_service qlproxy2 respmod_precache bypass=0 icap://127.0.0.1:1344/respmod
acl target_domains dstdomain "/path/to/target/domains/list"
adaptation_access qlproxy1 allow target_domains
adaptation_access qlproxy2 allow target_domains
adaptation_access qlproxy1 deny all
adaptation_access qlproxy2 deny all

will forward *only* requests/responses to those domain names specified in 
/path/to/target/domains/list to ICAP REQMOD and RESPMOD services.
All other connections are not forwarded to ICAP.

Raf

________________________________________
From: Mike <mcsn...@afo.net>
Sent: Wednesday, July 1, 2015 5:11 PM
To: Rafael Akchurin; squid-users@lists.squid-cache.org
Subject: Re: [squid-users] acl for redirect

Rafael, We're trying to keep the setups lean, and primarily just deal
with google and youtube, not all websites. ICAP processes deal with a
whole new layer of complexity and usually cover all websites, no just
the few.

On 6/30/2015 16:17 PM, Rafael Akchurin wrote:
> Hello Mike,
>
> May be it is time to take a look at ICAP/eCAP protocol implementations which 
> target specifically this problem - filtering within the *contents* of the 
> stream on Squid?
>
> Best regards,
> Rafael

Marcus,

This is multiple servers used for thousands of customers across North
America, not an office, so changing from a proxy to a DNS server is not
an option, since we would also be required to change all several
thousand of our customers DNS settings.

On 6/30/2015 17:30 PM, Marcus Kool wrote:
> I suggest to read this:
> https://support.google.com/websearch/answer/186669
>
> and look at option 3 of section 'Keep SafeSearch turned on for your
> network'
>
> Marcus

Such a pain, there is no reason for our every day searches should be
encrypted.


Mike

> -----Original Message-----
> From: squid-users [mailto:squid-users-boun...@lists.squid-cache.org] On 
> Behalf Of Mike
> Sent: Tuesday, June 30, 2015 10:49 PM
> To: squid-users@lists.squid-cache.org
> Subject: Re: [squid-users] acl for redirect
>
> Scratch that (my previous email to this list), google disabled their insecure 
> sites when used as part of a redirect. We as individual users can use that 
> url directly in the browser (
> http://www.google.com/webhp?nord=1 ) but any google page load starts with 
> secure page causing that redirect to fail... The newer 3.1.2 e2guardian SSL 
> MITM requires options (like a der certificate file) that cannot be used with 
> thousands of existing users on our system, so squid may be our only option.
>
> Another issue right now is google is using a "VPN-style" internal redirect on 
> their server, so e2guardian (shown in log) sees
> https://www.google.com:443  CONNECT, passes along TCP_TUNNEL/200
> www.google.com:443 to squid (shown in squid log), and after that it is 
> directly between google and the browser, not allowing e2guardian nor squid to 
> see further urls from google (such as search terms) for the rest of that 
> specific session. Can click news, maps, images, videos, and NONE of these are 
> passed along to the proxy.
>
> So my original question still stands, how to set an acl for google urls that 
> references a file with blocked terms/words/phrases, and denies it if those 
> terms are found (like a black list)?
>
> Another option I thought of is since the meta content in the code including 
> title is passed along, so is there a way to have it can the header or title 
> content as part of the acl "content scan" process?
>
>
> Thanks
> Mike
>
>
> On 6/26/2015 13:29 PM, Mike wrote:
>> Nevermind... I found another fix within e2guardian:
>>
>> etc/e2guardian/lists/urlregexplist
>>
>> Added this entry:
>> # Disable Google SSL Search
>> # allows e2g to filter searches properly
>> "^https://www.google.[a-z]{2,6}(.*)"->"http://www.google.com/webhp?nord=1";
>>
>>
>> This means whenever google.com or www.google.com is typed in the
>> address bar, it loads the insecure page and allows e2guardian to
>> properly filter whatever search terms they type in. This does break
>> other aspects such as google toolbars, using the search bar at upper
>> right of many browsers with google as the set search engine, and other
>> ways, but that is an issue we can live with.
>>
>> On 26/06/2015 2:36 a.m., Mike wrote:
>>> Amos, thanks for info.
>>>
>>> The primary settings being used in squid.conf:
>>>
>>> http_port 8080
>>> # this port is what will be used for SSL Proxy on client browser
>>> http_port 8081 intercept
>>>
>>> https_port 8082 intercept ssl-bump connection-auth=off
>>> generate-host-certificates=on dynamic_cert_mem_cache_size=16MB
>>> cert=/etc/squid/ssl/squid.pem key=/etc/squid/ssl/squid.key
>>> cipher=ECDHE-RSA-RC4-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-
>>> RSA-CAMELLIA128-SHA:AES128-SHA:RC4-SHA:HIGH:!aNULL:!MD5:!ADH
>>>
>>>
>>> sslcrtd_program /usr/lib64/squid/ssl_crtd -s /var/lib/squid_ssl_db -M
>>> 16MB sslcrtd_children 50 startup=5 idle=1 ssl_bump server-first all
>>> ssl_bump none localhost
>>>
>>>
>>> Then e2guardian uses 10101 for the browsers, and uses 8080 for
>>> connecting to squid on the same server.
>> Doesn;t matter. Due to TLS security requirements Squid ensures the TLS
>> connection in re-encrypted on outgoing.
>>
>>
>> I am doubtful eth nord works anymore since Googles own documentation
>> for schools states that one must install a MITM proxy that does the
>> traffic filtering - e2guardian is not one of those. IMO you should
>> convert your e2guardian config into Squid ACL rules that can be
>> applied to the bumped traffic without forcinghttp://
>>
>> But if nord does work, so should the deny_info in Squid. Something
>> like this probably:
>>
>>    acl google dstdomain .google.com
>>    deny_info 301:http://%H%R?nord=1  google
>>
>>    acl GwithQuery urlpath_regex ?
>>    deny_info 301:http://%H%R&nord=1  GwithQuery
>>
>>    http_access deny google Gquery
>>    http_access deny google
>>
>>
>> Amos
>>> _______________________________________________
>>> squid-users mailing list
>>> squid-users@lists.squid-cache.org
>>> http://lists.squid-cache.org/listinfo/squid-users
>>>
>> _______________________________________________
>> squid-users mailing list
>> squid-users@lists.squid-cache.org
>> http://lists.squid-cache.org/listinfo/squid-users
>>
> _______________________________________________
> squid-users mailing list
> squid-users@lists.squid-cache.org
> http://lists.squid-cache.org/listinfo/squid-users
>
_______________________________________________
squid-users mailing list
squid-users@lists.squid-cache.org
http://lists.squid-cache.org/listinfo/squid-users

Reply via email to