You can force all dns traffic to opnsense and Block the dns name
server { resolver 127.0.0.1; listen 1443; ssl_preread on; proxy_connect_timeout 5s; proxy_pass $ssl_preread_server_name:443; }
TYA for your input.However, all those workaround seem to introduce more side issues than anything... Is there any native SSL inspection we can implement to achieve a cleaner result?Apparently Zenarmor is planning to introduce that shortly, only for business licenses tho...(https://www.sunnyvalley.io/plans)
achieve a cleaner result?
There isnt a free alternative, thats why commercial stuff costs money
Quoteachieve a cleaner result?cleaner result would imply a sort of mitm i thinkyou can look at transparent proxy without tls termination (using only sni to make a decision) - but I'm sure it's not a complete solution.for real dpi, you will have to terminate the tls and force clients to trust your root cert. imho )
Quote from: mimugmail on March 07, 2023, 07:00:57 pmThere isnt a free alternative, thats why commercial stuff costs moneyThat’s not a fair comment buddy as I never mentioned I was looking for free stuff, as a matter of facts, I do pay for Zenarmor home plan; the problem is they’ve decided for some reason to enable (in the near future) full SSL inspection only for the BUSINESS plan leaving out both FREE, HOME and SOHO plans.
1. WhatsApp file transfer (pics, docs, vocals, etc) is being blocked despite I’ve tried to whitelist both WhatsApp.com and WhatsApp.net
2. I cannot find any documentation on house to trust self signed certificates on WatchOS (Apple Watch)
3. I am unable to get Wireguard’s road warriors going through the proxy