Jump to:navigation, search
Wiki





notempty
Dieser Artikel bezieht sich auf eine nicht mehr aktuelle Version!

notempty
Der Artikel für die neueste Version steht hier

notempty
Zu diesem Artikel gibt es bereits eine neuere Version, die sich allerdings auf eine Reseller-Preview bezieht





































































De.png
En.png
Fr.png






Transparent mode for the http-proxy of the UTM
Last adaption: 12.2
New:
  • Layout adjustment
  • Error cause for Host header forgery detected
  • The SNI validation can be deactivated
notempty
This article refers to a Resellerpreview

11.7

Access: UTM-IP:Port or UTM-URL:Port
Port as configured at Network / Appliance Settings / Webserver
Default-Port: 11115
i.e.: https://utm.ttt-point.de:11115
Default: https://192.168.175.1:11115
→ Applications →HTTP-ProxyTab Transparent mode

Functionality of the transparent proxy

The transparent proxy ensures that web page calls are routed through the HTTP proxy even without settings in the browser, so that the virus scanner and web filter can be used for these connections.

In order to be able to check SSL-encrypted connections for viruses and malware, the proxy must pretend to be a client to the web server on the Internet, so that the data can already be decrypted on the firewall.
These are to be passed on coded afterwards again to the actual Client in the internal network.
To achieve this, the feature SSL interception is used.

  • The regex exceptions do not apply to transparent mode!
  • Configuration

    Certificate

  • A CA is required for SSL-encrypted transmission to the client.
  • Certificates
    Create CA



    SSL-Interception

    SSL-Interception

    Configuration under → Applications →HTTP ProxyTab SSL Interception















































    Caption Value Description UTM v12.2 HTTP-Proxy SSL-Interception-en.png
    SSL-Interception: On Activates the SSL interception UTM v12.5.2 HTTP-Proxy SSL-Interception-en.png
    SSL Interception tab
    Webfilter based: No When enabled, only connections blocked by the web filter are intercepted.

    This avoids the problem that there are sites that do not tolerate an interruption of the encryption (e.g. banking software) without having to define an exception for it.

    Validate SNI
    Only available when "Webfilter-based" is active.
    No Bei Aktivierung Yes wird eine sich ggf. im ClientHello des TLS-Handshake befindliche SNI geprüft.

    Dabei wird der enthaltene Hostname aufgelöst und die Adressen im Ergebnis mit der Zieladresse des abgefangenen Requests abgeglichen.
    Bei Nichtübereinstimmung wird die Verbindung geschlossen.

  • Without Server Name Indication validation, clients can manipulate SNI arbitrarily to bypass the web filter.
  • This setting should only be considered as a last resort when it seems impossible to standardize the DNS settings between the HTTP proxy and the UTM clients.
  • Verwenden Client und UTM unterschiedliche DNS-Server, kann es dabei zu false-positives kommen.
  • SNI in den Ausnahmen validieren:notempty
    New as of v12.5.2

    Nur verfügbar, wenn Webfilter basiert nicht aktiv ist
    No Wendet die Server Name Indication Validierung nur auf aktivierte Yes  Ausnahmen für SSL-Interception  an
    Allow non identified protocols: Yes If this switch is deactivated, unrecognized protocols are blocked
    CA-Certificate: CA-SSL-Interception Here, a CA must be selected that can re-encrypt the connection after decryption (and scanning).
    The public key of the CA must be installed on all client computers that are to use SSL Interception. Download can be done here directly with  Download public key .
    Download public key The public key should be installed on the clients that are going to use SSL interception to avoid certificate errors.
    Peer verification: Off This should definitely be enabled With this, the HTTP proxy checks whether the certificate of the called page is trustworthy. Since the browser only sees the local certificate, a check by the browser is no longer possible.
     Exceptions for SSL-Interception  On It is possible to define exceptions in the format of Regular Expressions. However, since only https can arrive here, it is not filtered for protocols, unlike the virus scanner.
    With + Regex new exceptions are added.
    So an exception for www.securepoint.de would be: .*\.securepoint\.de"
      
  • Regex exceptions do not apply to transparent mode!
  •  Peer verification exceptions  Aus Here exceptions for certificate verification in regex format can be added.



    Add certificate to the browser


    To do this, the public part of the CA is downloaded via the button UTMV11 SI PKdladenB.png.
    Either by logging in from each individual client on the UTM to store the CA on them or it is downloaded once and stored on a USB stick or network storage. The certificate is then added to the browser via this route.


    Cl Chrome Zertverw.png
    Certificate management
    1. In the settings of the browser is the certificate management.
    Cl Chrome ZMZs.png
    Certificate Authorities
    2. In the Certificate Manager under Certificate Authorities the CA is imported.
    Cl Chrome ZMZsWv.png
    Certificate for websites
    3. The downloaded CA is selected from the appropriate directory.
    Cl Chrome ZMZsmCA.png
    Certification Authorities with CA
    4. When asked if the CA should be trusted as a certification authority, the line "Trust this certificate to identify websites" is checked.
    5. Finally, click OK.












    Transparent mode

    Transparent mode

    Tab Transparent mode

    Activation with  Transparent mode  On





    Create HTTPS rule

    In the default setting, transparent mode is already enabled for the HTTP protocol over port 80.
    To set this up for the HTTPS protocol and port 443 as well, another rule is added by clicking the Add Transparent Rule button.

    Caption Value Description UTM v12.2 HTTP-Proxy Transparent Regel-hinzufügen-en.png
    Add transparent rule for HTTPS
    Protocol HTTPS Protocol that is to be scanned
    Type Include
    Exclude
    Determines whether transparent mode should be applied to the following network groups or not.
    If a specific network object or network group is to be excluded from transparent mode as a source or destination, an Exclude rule can define an exception before the general Include rule.
    Source: Newtzwerkobjekt Source network object, created under → Firewall →PortfilterTab network object
    The source must be the network from which the requests come, e.g. internal-network.
    Destination: internet Target network object in which the web servers to be addressed are located, in this example internet.

    Clicking Save will save the new rule.
    Another click on Save in the HTTP proxy window will update the rules.


    Port filter rules

    Since both HTTP with port 80 and HTTPS with port 443 are redirected via the proxy, it must be ensured that the name resolution can take place.
    If the UTM is registered as a name server with the clients, a rule is required that allows DNS from the local (private) networks to the associated network interface.

    In the factory settings, a corresponding rule already exists with the service group Proxy. This also contains the nameserver port 53 for UDP and TCP.

    Finally you should check in the memu → Firewall →Portfilter if a corresponding rule exists.

    # Source: Destination: Service NAT Action Active
    Port filter rule for access to DNS resolution Dragndrop.png 2 Network.svg internal-network Interface.svg internal-interface Service-group.svg proxy Accept On

    Examples of exceptions for Windows update server

    For more examples on how to set up SSL interception, authentication exceptions, virus scanners, and web filters regarding Windows updates, see the knowledge base article Windows Updates with HTTP Proxy and Web Filter


    Troubleshooting





























    Situation

    • UTM with active transparent HTTP proxy for HTTP and HTTPS.
    • SSL interception running in "Web Filter Based" mode.


    Error message in the browser

    ERROR_SSL_PROTOCOL_ERROR

    or

    ssl_error_rx_record_too_long


    Log message in the UTM

    Log message of Squid (menu Log ) in the UTM:

    2021-09-15T16:50:20.003+02:00|squid|8933|1631717419.981 1 192.0.2.192 NONE/200 0 CONNECT 104.96.47.5:443 - HIER_NONE/- -
    2021-09-15T16:50:20.007+02:00|squid|8933|1631717420.007 27 192.0.2.192 NONE_ABORTED/409 12387 CONNECT loadbalancing.ttt-point.de:443 - HIER_NONE/- text/html
    2021-09-15T16:50:20.007+02:00|squid|8933|1631717420.007 27 192.0.2.192 NONE_ABORTED/409 12387 CONNECT loadbalancing.ttt-point.de:443 - HIER_NONE/- text/html
    2021-09-15T16:50:22.652+02:00|squid|8933|SECURITY ALERT: Host header forgery detected on local=192.0.2.22:443 remote=192.168.175.10:28144 FD 9 flags=33 (local IP does not match any domain IP)
    2021-09-15T16:50:22.654+02:00|squid|8933|SECURITY ALERT: on URL: loadbalancing.ttt-point.de:443



    Meaning

    • The client starts a TCP connection to an HTTPS server
    • The connection is intercepted by the UTM → Transparent Proxy
    • The HTTP proxy (Squid) checks the connection and analyzes the TLS handshake
    • The information obtained, such as the SNI, is thereby resolved and compared with the original IP address
    • In this case, the original IP and the resolved IP for the SNI (hostname) do not match and are therefore blocked by the HTTP proxy, resulting in the above mentioned error message


    Cause

    This behavior can be observed for hostnames with intensive load balancing.
    If the provider gives different responses to DNS queries in a short period of time, the results in DNS resolution may differ between the client and the UTM.

    This behavior can be caused by:

    • different DNS servers on client and UTM.
    • Hostnames that are resolved differently by UTM and client with a very small TTL due to intensive load balancing.
    • Use of DNS servers at different geographical locations.
      In this case, a different IP address can be returned via the remote location for the called host names than at the local location of the UTM. (Geographic DNS Routing)


    Solution

    • On the client, the UTM is entered as the global proxy server and, if necessary, as the proxy server for each application.
    • Workaround: The same DNS servers are entered on the client and UTM.
  • This procedure minimizes the error rate, but cannot reliably prevent the problem, especially with servers that use load balancing with very short TTLs. In addition, it must be ensured that no DNS servers are used that are themselves already addressed via Geographic DNS Routing.
    The Google servers, for example, differ despite identical IP address depending on the region from which they are called!
    • Einfach, aber unsicher:
      Unter Applications HTTP Proxy  Area SSL-Interception die Option SNI validieren: Nein deaktivieren.
      Ohne SNI Validierung können Clients die SNI beliebig manipulieren, um den Webfilter zu passieren. Diese Einstellung sollte nur als eine letzte Möglichkeit betrachtet werden, wenn es unmöglich scheint, die DNS-Einstellungen zwischen Clients des HTTP-Proxy und der UTM zu vereinheitlichen.