[squid-users] HTTPS Requests in a Transparent Proxy without SSL Bump
Matus UHLAR - fantomas
uhlar at fantomas.sk
Mon Oct 20 18:44:56 UTC 2025
On 20.10.25 10:59, Jonathan Lee wrote:
>There is also a setting called t-proxy I tried it seems to work well when compared to intercept and transparent. I read about it in pfSense you have to adapt the config to make it work.
Tproxy means transparent/intercept (it's the same)
+ changing outgoing IP address as if the connection went from clients' original IP
address.
The rest is still the same.
>> On Oct 20, 2025, at 09:41, Alex Rousskov <rousskov at measurement-factory.com> wrote:
>>
>> On 2025-10-20 05:29, Gonzalo Vázquez Enjamio wrote:
>>
>>> My question is if it would be possible to log HTTPS traffic, in a Squid in transparent mode, without intercepting the traffic?
>>> I know it's possible with a proxy in explicit mode, but in transparent mode?
>>
>> Your earlier question had "without using an SSL Bump" condition. I assume your revised question uses that condition as well.
>>
>> I believe I have answered your earlier question, but since you are asking a similar question again, I assume that my earlier response was problematic. I do not know what that problem was, and you have not told me why that earlier answer was not satisfactory, but perhaps there is a conflict in terminology:
>>
>> * How do you define "transparent mode"?
>>
>> * How do you define "intercepting the traffic"?
>>
>> * Do you want to log individual HTTP(S) transaction details (e.g., request URLs) or just TCP-level connection details (e.g., IP addresses and ports)?
I believe that with bit of tweaking, even spliced SSL connection could be logged
as "CONNECT %ssl::>sni"
thus revealing at least requested server name of destination server (if available)
>>> El vie, 17 oct 2025 a las 15:24, Alex Rousskov escribió:
>>> On 2025-10-17 05:57, Gonzalo Vázquez Enjamio wrote:
>>> > Is it possible to handle HTTPS requests and log them in a
>>> transparent
>>> > proxy with Squid without using an SSL Bump?
>>> If you are asking about intercepted TLS connections (i.e. https_port),
>>> then all Squid can do with them (without SslBump) is to log TCP-level
>>> details of each connection. No individual HTTP requests are visible to
>>> Squid in this setup.
>>> If you are asking about plain text HTTP requests for "https://..."
>>> targets/URLs arriving on an intercepted plain TCP connection (i.e.
>>> http_port), then Squid should be able to handle (e.g., deny, forward,
>>> cache, and log) those requests individually.
>>> If you do not know which case applies to you, it is most likely the
>>> first case because plain "GET https://..." requests are rare and are
>>> usually seen in non-intercepting setups.
--
Matus UHLAR - fantomas, uhlar at fantomas.sk ; http://www.fantomas.sk/
Warning: I wish NOT to receive e-mail advertising to this address.
Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu.
99 percent of lawyers give the rest a bad name.
More information about the squid-users
mailing list