cat /var/log/squid/cache.log[...]2019/01/22 10:00:54 kid1| Accepting NAT intercepted HTTP Socket connections at local=[::1]:3128 remote=[::] FD 14 flags=41
but IPv6 NAT redirect is not implemented in BSD (so in OPNSense). I can create an IPv6 rule under "Firewall: NAT: Port Forward" but it seems to be ignored by the system. Is this correct?
rdr on lagg0_vlanXXXX inet6 proto tcp from (InterceptNets:network) port 1024:65535 to any port = http -> <Host_localhost> port 3128 round-robin
Your PF rule redirects a packet to ::1, but doesn't change the receiving interface. Thus, it violates scoping rules. You can tell by running 'netstat -s -f inet6 | grep "violated scope"' before and after generating the traffic that you want to redirect. The check is in in6_setscope().The simple workaround is to change your rdr rule to redirect to your actual link-local, site-local, or global IPv6 address instead of ::1.
I would think that it makes sense to allow that out of the box.