Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - opnsensler

#1
Hi,

thanks for your answer. At the moment, we use your first option. We have a own CA for the MITM Proxy and it works with our clients and our usecase. So that is fine.
But the IDS/IPS doen't work. I don't know what I have to do, that the IDS/IPS scan the decrypted HTTPS traffic.
#2
Hi,

we have the same "problem", is there any solution? In my Tests Suricata doesn't scan the Web Proxy Traffic. I tested with the eicar.com test virus.

Greetz
#3
Hi together,

we use a OPNsense with SQUID Proxy as a non transparent Proxy.
We have SQUID as https froward proxy in our network. One of our application sends a API request out of the network. The webservice needs a client certificate for auth. Application is working fine directly without SQUID proxy.

We need SQUID to decrypt SSL traffic and also authenticate and pass the authentication certificate (client certificate) to webservice server. What are the possible configurations for SQUID for this case?

Greetz
opnsensler