I've been searching for many hours now about a way to setup a transparent proxy for SSL (not Squid). The general answer is that I can't, but I know there are some ways, though. My purpose is only the following:
- Blacklist/whitelist domain names (not IP numbers). Content won't be filtered or modified at all.
- Force users through these lists. If I modify such settings in the web browsers, they can just undo it.
The following page tells I could pass the traffic unmodified, but it doesn't say how: iptables https transparent proxy with privoxy?
The following page shows an iptables rule for 443 which I myself couldn't get to work: http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:proxy
The following page tells how to get this to work only with Squid: http://www.rahulpahade.com/content/squid-transparent-proxy-over-ssl-https
EDIT: One person says here: How do I use IPTABLES to create a HTTPS (443) passthrough around Squid? "The best thing for you to do is to block direct access to port 443 and tell your users that if they want to use HTTPS, they must configure their browser to use the proxy." But I just know how to block 443 completely, not to make it work under a proxy then.
If you want to filter on domain names, you have two possible ways: you could take the name from the CONNECT method issued by the client if it knows that it has to use a proxy for HTTPS conenctions and filter on that one (Squids supports that BTW). Or, if you really really need to do it transparently, you would need to look into the (encrypted) request headers.
If you want to see encrypted request headers, you need to have a key. If you want to have a key, you need a certificate which is a) trusted by the client to be the "correct" certificate and b) certifies every possible host (wildcard-everything).
So what you would need to do is
Mostly, if you need transparent proxying it is because you do not want or cannot reconfigure the clients to use the proxy. If this is the case with your request as well, you probably would not have the option to install certificates on clients and mark them as "trusted". So even though there is a technical way for transparent SSL proxying, I suspect not much will be won for you.
I know this is an old question, but if the OP only wants to blacklist/whitelist certain domain names, they don't have to use a proxy at all, they could just use a DNS based blacklist.
Any other domain will be allowed. All web traffic SSL or otherwise will pass through the gateway unchanged.
Edit: Seeing as the OP is prepared to force users through his lists, he can block other methods of accessing DNS. This way, if the user tries to use one of those other DNS methods that are blocked, the websites just will not work. aka 'My way or the highway'
For DNS-over-HTTPS that @wheeler mentioned, you can just block regular DNS looksups to sites such as https://dns.google.com and https://cloudflare-dns.com/dns-query and https://doh.cleanbrowsing.org/doh/family-filter/. Though this will quickly become untenable as more and more services come online.
You may also need a way of blocking MIME types such as application/dns-udpwireformat for other methods of DNS being developed.
Delegate can work as Man-In-The-Middle proxy for HTTPS.
For transparent mode, Inline IPS (Suricata, Snort) system can help you to block ssl sites.
https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Setting_up_IPSinline_for_Linux
Block SSL Site Rules for Specific User:
Block File Download Rules Based on Extensions:
Try this out with SimpleWall
Its very very simple to add block rule with Simplewall web interface.
You can also add rules under
Simplewall => Content Filter
use same rules for IPS along with http content filter.