Skip to content

vieux448/setup-squid-proxy-with-security-best-practice

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

Setup Squid Proxy With Security Best Practice

Hits

  • Security best practices when a squid proxy is being used as a "forward proxy"
  • If you are configuring as a reverse proxy, some topics in this guide may not be applicable. We recommend cross-referencing other security guides for appropriate security hardening criteria when using Reverse Proxy.
  • Last Modified: May 31, 2024
# cat /etc/redhat-release
Rocky Linux release 8.8 (Green Obsidian)

# rpm -qa rpm -qa | grep squid
squid-4.15-6.module+el8.8.0+1273+55f5b063.x86_64

Table of Contents


1. Ensure that SQUID is run using a non-privileged, dedicated service account - groups

The Squid proxy runs using the default account, which is usually named 'squid'. If the Squid proxy is not running under the 'squid' account or is being executed with root privileges, you should change it.

Audit:

  • Check the Squid process account.
[root@localhost ~]# ps -ef | grep squid
root        5346       1  0 Nov03 ?        00:00:00 /usr/sbin/squid --foreground -f /etc/squid/squid.conf
squid       5349    5346  0 Nov03 ?        00:00:04 (squid-1) --kid squid-1 --foreground -f /etc/squid/squid.conf

Remediation:

  • If the process account is not 'squid,' change it to 'squid' and restart the service.
[root@localhost ~]# vim /usr/lib/systemd/system/squid.service

[Unit]
Description=Squid caching proxy
Documentation=man:squid(8)
After=network.target network-online.target nss-lookup.target

[Service]
Type=notify
LimitNOFILE=16384
PIDFile=/run/squid.pid
...
KillMode=mixed
NotifyAccess=all

User=squid   # <== Change to 'squid'
Group=squid  # <== Change to 'squid'
  • Ensure that the 'squid' account does not have shell login permissions for regular users.
[root@localhost ~]# cat /etc/passwd | grep -i squid
squid:x:23:23::/var/spool/squid:/sbin/nologin

2. Ensure access to SQUID directories and files is restricted

Directories and configuration files related to Squid should only be accessible by the 'squid' or 'root' user. Verify and adjust permissions if other users have access to these directories and files.

Audit:

  • Check the permissions for directories and files related to the Squid proxy.
[root@localhost ~]# ls -al /etc/squid/
total 72
drwxr-xr-x.  3 root root   4096 Oct 26 07:57 .
drwxr-xr-x. 87 root root   8192 Oct 20 14:06 ..
-rw-r--r--.  1 root squid   692 May 10  2021 cachemgr.conf
-rw-r--r--.  1 root root    692 May 10  2021 cachemgr.conf.default
drwxrwxr-x.  2 root root    102 Oct 26 07:56 conf.d
-rw-r--r--.  1 root root   1800 May 10  2021 errorpage.css
-rw-r--r--.  1 root root   1800 May 10  2021 errorpage.css.default
-rw-r--r--.  1 root root  12077 May 10  2021 mime.conf
-rw-r--r--.  1 root root  12077 May 10  2021 mime.conf.default
-rw-r-----.  1 root squid  1859 Oct 17 17:08 squid.conf

Remediation:

  • Ensure that directories and files are owned by the 'root' user and that other users do not have access.
[root@localhost ~]# chown root:root -R /etc/squid
[root@localhost ~]# chmod o-rwx -R /etc/squid

3. Ensure httpd_suppress_version_string directive is set to "on"

By default, the Squid proxy displays the installed proxy version information in the Server header and on error pages. To prevent the version information from being displayed, follow these steps.

Audit:

  • Check if the proxy version information is exposed in the Server header.
[root@localhost ~]# curl -i -k 127.0.0.1:3128
HTTP/1.1 400 Bad Request
Server: squid/4.15
...
  • Also, confirm whether the proxy version information is exposed on error pages.
[root@localhost ~]# curl -i -k 127.0.0.1:3128
HTTP/1.1 400 Bad Request
...

<hr>
<div id="footer">
<p>Generated Mon, 18 Sep 2023 05:50:08 GMT by blah-proxy01 (squid/4.15)</p>
<!-- ERR_INVALID_URL -->
</div>
</body></html>
...

Remediation:

  • Prevent the version information from being displayed by setting "httpd_suppress_version_string" to "on" in the Squid configuration file. This will hide the version information in the Server header and on error pages.
[root@localhost ~]# vim /etc/squid/squid.conf
...

httpd_suppress_version_string on  # <== Add 

4. Ensure "Via" Header is removed

The "Via" header reveals information about the server that received the proxy request from the client, including the hostname and proxy version information. To remove the "Via" header, follow these steps.

Audit:

  • Check if the "Via" header is present in the proxy response.
[root@localhost ~]# curl -i -k 127.0.0.1:3128
HTTP/1.1 400 Bad Request
...
Via: 1.1 blah-proxy01 (squid/4.15)
Connection: close

Remediation:

  • To prevent the "Via" header from being displayed, set the via configuration to "off" in the Squid configuration file.
[root@localhost ~]# vim /etc/squid/squid.conf
...

via off    # <== Add

5. Ensure "X-Cache, X-Cache-Lookup" Headers are removed

The "X-Cache" and "X-Cache-Lookup" headers provide information about the proxy's caching behavior. The "X-Cache" header can reveal the hostname of the proxy server and the installed proxy version, so it's a good practice to remove it.

Audit:

  • Check if the "X-Cache" header is present in the proxy response.
[root@localhost ~]# curl -i -k 127.0.0.1:3128
HTTP/1.1 400 Bad Request
...

X-Cache: MISS from blah-proxy01
X-Cache-Lookup: NONE from blah-proxy01:3128
Via: 1.1 blah-proxy01 (squid/4.15)
Connection: close

Remediation:

  • To prevent the "X-Cache" and "X-Cache-Lookup" headers from being displayed, use the reply_header_access setting to deny access to these headers.
[root@localhost ~]# vim /etc/squid/squid.conf
...

reply_header_access X-Cache deny all          # <== Add
reply_header_access X-Cache-Lookup deny all   # <== Add

( Notes )

  • Example of X-Cache Responses
ID Value Description
1 X-Cache: MISS from blah-proxy01 Indicates that the requested resource could not be found in Squid's cache via the blah-proxy01 server, so it needs to be retrieved from the remote server for the client.
2 X-Cache-Lookup: NONE from blah-proxy01:3128 epresents the cache lookup result for the requested resource by Squid proxy. "NONE" indicates that Squid did not perform a cache lookup for this resource at blah-proxy01:3128. Since there is no cache lookup, it implies that the resource needs to be fetched from the remote server.

6. Ensure Inbound X-Forwarded-For Header is restricted

The "follow_x_forwarded_for" feature allows you to identify the client's actual IP address through the X-Forwarded-For header.

It is equivalent to configuring the X-Forwarded-For header for client IP identification in web servers like Apache or Nginx.
In a Forward Proxy, you have the ability to modify the X-Forwarded-For header to include arbitrary changes before forwarding it.
Since the proxy connection request IP may differ from the actual client IP, it's recommended not to use this feature.

Audit:

  • Check if the "follow_x_forwarded_for" feature is restricted. If it's not explicitly specified in the configuration, it is in its default state (not restricted).
[root@localhost ~]# vim /etc/squid/squid.conf
...

follow_x_forwarded_for ...
follow_x_forwarded_for ...

Remediation:

  • To restrict the "follow_x_forwarded_for" setting, limit it to the local host.
[root@localhost ~]# vim /etc/squid/squid.conf
...

follow_x_forwarded_for allow localhost   # <== Add
follow_x_forwarded_for deny all          # <== Add
request_header_access X-Forwarded-For deny all # <=== Add
  • This configuration ensures that the "follow_x_forwarded_for" setting only allows the localhost to modify the X-Forwarded-For header and denies all other clients from modifying it.

7. Ensure Outbound X-Forwarded-For Header is restricted

The "forwarded_for" feature allows you to add the client's actual IP address to the HTTP request header for transmission.

If the forwarded_for feature is enabled, the proxy server adds the client's IP address to the X-Forwarded-For header when making requests to external URLs.
For example, when system A connects to www.google.com through a proxy, the proxy server sends the web page request to www.google.com with system A's IP address set in the X-Forwarded-For header.

Since the internal system's IP is being sent to external hosts and can be identified, it's recommended not to use this feature.

Audit:

  • Check if the forwarded_for feature is disabled. If it's not explicitly specified in the configuration, it is in its default state (enabled).
[root@localhost ~]# vim /etc/squid/squid.conf
...

forwarded_for delete  # <== It should be set to 'delete' or 'off'

Remediation:

  • Set the "forwarded_for" to "delete" to disable the feature.
  • To prevent clients from inserting IP addresses into the X-Forwarded-For header, block it using request_header_access.
[root@localhost ~]# vim /etc/squid/squid.conf
...

forwarded_for delete  # <== Add
request_header_access X-Forwarded-For deny all # <=== Add

8. Ensure HTTP Method is restricted

Configuring HTTP methods in Squid is the process of setting the allowed HTTP methods for URLs accessed through the proxy.
Typically, only GET, POST, OPTIONS, and CONNECT should be allowed.

The CONNECT method is used to establish a tunnel through the proxy and is commonly used for HTTPS connections.

Remediation:

  • Set the allowed HTTP methods for proxy access. If not explicitly specified, all HTTP methods are allowed.
  • For a "Forward Proxy", restrict the allowed methods to GET, POST, OPTIONS, and CONNECT.
[root@localhost ~]# vim /etc/squid/squid.conf

acl Safe_ports port 80              # http
acl Safe_ports port 443             # https
...

acl Safe_methods method GET POST OPTIONS CONNECT  # <== Define allowed methods
  • This configuration ensures that only the specified HTTP methods (GET, POST, OPTIONS, and CONNECT) are allowed through the proxy, enhancing security.

9. Ensure Access Control Policy (ACL) is correct

Access control policies can vary depending on the implementation approach.

If there are trusted internal hosts, domains, or IP ranges, you can configure the proxy to allow access to all external URLs.

Alternatively, you can restrict access to specific external URLs only for trusted internal hosts, domains, or IP ranges.

Each policy can also be controlled by setting a time limit for operation

Remediation:

  • Package updates, library downloads, and other trusted targets (URLs) can be allowed for common usage.
  • For other cases, configure access control policies by specifying trusted (source) hosts, domains, or IP ranges and specifying the necessary (destination) external URLs to restrict access.
  • If proxy usage is required for a specific time period, set the operational hours using the time directive.

Here are some example scenarios of access control policies:)

9.1. Allow all external access for specific (source) hosts/ranges (Any destination)

< squid.conf >

...

acl Safe_ports port 80              # http
acl Safe_ports port 443             # https
...

acl Safe_methods method GET POST OPTIONS CONNECT
...

acl service-src src "/etc/squid/acl/infra-src.acl"
acl service-dst dst all
...

http_access deny !Safe_ports
...

http_access allow Safe_methods service-src service-dst
http_access deny service-src

# And finally deny all other access to this proxy
http_access deny all
 
 
# Squid normally listens to port 3128
http_port 3128

< infra-src.acl >

192.168.100.22
live-oauth-app1
live-oauth-app2
www.mydomain.net    #Domain
.google.com         #Depth Domain

9.2. Allow specific (source) hosts/ranges to access specified (destination) URLs (Scenario 1)

< squid.conf >

...

acl Safe_ports port 80              # http
acl Safe_ports port 443             # https
...

acl Safe_methods method GET POST OPTIONS CONNECT
...

acl service-src src "/etc/squid/acl/infra-src.acl"
acl service-dst dstdomain "/etc/squid/acl/infra-dst.acl"
...

http_access deny !Safe_ports

...
http_access allow Safe_methods service-src service-dst
http_access allow localhost
http_access deny service-src

# And finally deny all other access to this proxy
http_access deny all
 
# Squid normally listens to port 3128
http_port 3128

< infra-src.acl >

10.10.1000/24      # public zone
192.168.100.0/24   # dev zone
192.168.101.0/24   # public rc
...

< infra-dst.acl >

.okta.com
rpm.releases.hashicorp.com
download.docker.com
.github.com
files.pythonhosted.org
api.slack.com

9.3. Allow specific (source) hosts/ranges to access specified (destination) URLs (Scenario 2)

< squid.conf >

...

acl Safe_ports port 80              # http
acl Safe_ports port 443             # https
...

acl Safe_methods method GET POST OPTIONS CONNECT
...

include /etc/squid/conf.d/object_src.conf
include /etc/squid/conf.d/object_dst.conf
include /etc/squid/conf.d/access_policy.conf
...

http_access deny Safe_methods !Safe_ports

...

# And finally deny all other access to this proxy
http_access allow localhost
http_access deny all
 
 
# Squid normally listens to port 3128
http_port 3128

< object_src.conf >

acl ip_all src 10.0.0.0/24          # office 
acl ip_all src 192.168.0.0/24       # office 
acl sandbox-webapp01 src 192.168.100.20

< object_dst.conf >

# dom_linux_mirror
acl dom_linux_mirror dstdomain mirrors.fedoraproject.org        # EPEL
acl dom_linux_mirror dstdomain vault.centos.org                 # CentOS 6
acl dom_linux_mirror dstdomain mirrors.rockylinux.org           # Rocky 8~9
acl dom_linux_mirror dstdomain mirror.anigil.com                # CentOS 6~7, Rocky 8~9, Ubuntu
acl dom_linux_mirror dstdomain dl.rockylinux.org                # Rocky Mirror

acl dom_python dstdomain pypi.python.org
acl dom_python dstdomain pypi.org
acl dom_python dstdomain files.pythonhosted.org

acl dom_slack dstdomain slack.com
acl dom_slack dstdomain api.slack.com
acl dom_slack dstdomain hooks.slack.com

< access_policy.conf >

http_access allow Safe_methods ip_all dom_linux_mirror
http_access allow Safe_methods sandbox-webapp01 dom_slack
http_access allow Safe_methods sandbox-webapp01 dom_python

9.4. Configure policies with specified operating hours

  • policy set to work only from 00:00-19:00 every day
acl all_weekdays time 00:00-19:00
...

http_access allow Safe_methods all_weekdays service-src service-dst
http_access allow localhost
http_access deny service-src
  • policy set to work on Saturday and Sunday only
acl weekend time S Su 00:00-23:59
...

http_access allow Safe_methods weekend service-src service-dst
http_access allow localhost
http_access deny service-src

10. Ensure detailed logging is enabled

In the Squid proxy access logs, the timestamp is recorded in Unix timestamp format, which is not human-readable.
To improve log readability, you should convert the timestamp into a human-readable format, and the log's timezone should be set to the local system timezone.

Additionally, access logs should include essential information for access log analysis, such as remote IP, requested URL, User-Agent, response status, data transfer size (bytes sent and received), and more.

Audit:

  • Check if the proxy logs are currently stored in the default format.
[root@localhost ~]# tail -f /var/log/squid/access.log
1694992833.804     17 192.168.130.229 TCP_MISS/200 4814 GET http://mirror.anigil.com/rocky/8/BaseOS/x86_64/os/repodata/repomd.xml - HIER_DIRECT/123.215.145.59 text/xml
1694992833.907     87 192.168.130.229 TCP_REFRESH_UNMODIFIED/200 299272 GET http://mirror.anigil.com/rocky/8/BaseOS/x86_64/os/repodata/dae7e104812099a2f632ea4c5ef2769aca18ca1205abdd2c3ba6d171e319df3d-comps-BaseOS.x86_64.xml - HIER_DIRECT/123.215.145.59 text/xml
1694992833.979     68 192.168.130.229 TCP_REFRESH_UNMODIFIED/200 180225 GET http://mirror.anigil.com/rocky/8/BaseOS/x86_64/os/repodata/6e06094b5adbf763f3fb52604759f8ebcdc553db9dc920c9b30b61a65754dca7-updateinfo.xml.gz - HIER_DIRECT/123.215.145.59 application/octet-stream
1694992834.185    370 192.168.130.229 TCP_REFRESH_UNMODIFIED/200 2669167 GET http://mirror.anigil.com/rocky/8/BaseOS/x86_64/os/repodata/56d8b0ff58f5b55a73b424d817141f9f3e010b5554988993ba82a7143b0282b8-filelists.xml.gz - HIER_DIRECT/123.215.145.59 application/octet-stream
1694992834.191    380 192.168.130.229 TCP_REFRESH_UNMODIFIED/200 3141032 GET http://mirror.anigil.com/rocky/8/BaseOS/x86_64/os/repodata/f39a0bb438dd2cec4fecba48a4947d9bb0c2726a5ab4c5525e5d41817c7c436e-primary.xml.gz - HIER_DIRECT/123.215.145.59 application/octet-stream
1694992840.818     45 192.168.130.229 TCP_MISS/200 3538 GET http://mirror.anigil.com/rocky/8/extras/x86_64/os/repodata/repomd.xml - HIER_DIRECT/123.215.145.59 text/xml
1694992846.285      3 192.168.130.229 TCP_DENIED/403 3951 CONNECT rpm.dl.getenvoy.io:443 - HIER_NONE/- text/html
1694992846.296      3 192.168.130.229 TCP_DENIED/403 3951 CONNECT rpm.dl.getenvoy.io:443 - HIER_NONE/- text/html
1694992846.309      4 192.168.130.229 TCP_DENIED/403 3951 CONNECT rpm.dl.getenvoy.io:443 - HIER_NONE/- text/html

Remediation:

  • change the timestamps to human-readable format
  • set the timezone to the local system timezone
  • Set the remote IP, requested URL, User-Agent, transfer result, and sent/received data size in the log format
[root@localhost ~]# vim /etc/squid/squid.conf
...

logformat custom_log %{%Y-%m-%d %H:%M:%S}tl %>a:%>p %Ss/%03>Hs:%Sh "%rm %ru HTTP/%rv" %mt %>Hs %<st %tr "%{User-Agent}>h" "%{Referer}>h"
access_log /var/log/squid/access.log custom_log
  • This configuration changes the log format to a human-readable format and includes the desired information. For example:
[root@localhost ~]# cat /var/log/squid/access.log
...

2023-10-31 08:44:22 192.168.0.182:48834 NONE/000:HIER_NONE "NONE error:transaction-end-before-headers HTTP/0.0" - 0 0 0 "-" "-"
2023-10-31 08:45:22 192.168.0.182:45606 NONE/000:HIER_NONE "NONE error:transaction-end-before-headers HTTP/0.0" - 0 0 0 "-" "-"
2023-10-31 08:46:22 192.168.0.182:55104 NONE/000:HIER_NONE "NONE error:transaction-end-before-headers HTTP/0.0" - 0 0 0 "-" "-"
2023-10-31 08:46:32 192.168.0.149:53972 TCP_MISS/200:HIER_DIRECT "GET http://dl.rockylinux.org/pub/rocky/8/AppStream/x86_64/os/repodata/repomd.xml HTTP/1.1" text/xml 200 5265 6665 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:46:37 192.168.0.149:49404 TCP_MISS/200:HIER_DIRECT "GET http://dl.rockylinux.org/pub/rocky/8/BaseOS/x86_64/os/repodata/repomd.xml HTTP/1.1" text/xml 200 4793 234 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:46:42 192.168.0.149:49420 TCP_MISS/200:HIER_DIRECT "GET http://dl.rockylinux.org/pub/rocky/8/extras/x86_64/os/repodata/repomd.xml HTTP/1.1" text/xml 200 3517 233 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:46:42 192.168.130.225:40470 TCP_TUNNEL/200:HIER_DIRECT "CONNECT plugins.nessus.org:443 HTTP/1.1" - 200 5710 5674 "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36" "-"
2023-10-31 08:46:52 192.168.0.149:49432 TCP_TUNNEL/200:HIER_DIRECT "CONNECT mirror.kakao.com:443 HTTP/1.1" - 200 9445 10393 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:47:22 192.168.0.182:54734 NONE/000:HIER_NONE "NONE error:transaction-end-before-headers HTTP/0.0" - 0 0 0 "-" "-"
2023-10-31 08:48:22 192.168.0.182:40026 NONE/000:HIER_NONE "NONE error:transaction-end-before-headers HTTP/0.0" - 0 0 0 "-" "-"
2023-10-31 08:48:58 192.168.2.109:39028 TCP_MISS/200:HIER_DIRECT "GET http://dl.rockylinux.org/pub/rocky/8/AppStream/x86_64/os/repodata/repomd.xml HTTP/1.1" text/xml 200 5264 5428 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:48:58 192.168.2.109:39038 TCP_MISS/200:HIER_DIRECT "GET http://dl.rockylinux.org/pub/rocky/8/BaseOS/x86_64/os/repodata/repomd.xml HTTP/1.1" text/xml 200 4791 236 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:48:58 192.168.2.109:39044 TCP_MISS/200:HIER_DIRECT "GET http://dl.rockylinux.org/pub/rocky/8/extras/x86_64/os/repodata/repomd.xml HTTP/1.1" text/xml 200 3515 232 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-10-31 08:49:04 192.168.2.109:55508 TCP_TUNNEL/200:HIER_DIRECT "CONNECT mirror.kakao.com:443 HTTP/1.1" - 200 9442 63 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
  • The timestamp is now in the format "YYYY-MM-DD HH:MM:SS," which is much more readable.

11. Ensure log files are rotated

Logs should be managed on a daily basis and stored for more than 30 days. For cache logs, you can set the retention period as needed.

[ Logs to be retained ]

ID Value File Description
1 Access Logs /var/log/squid/access.log Records information about HTTP requests and responses processed by the proxy.
2 Cache Logs /var/log/squid/cache.log Contains information about the operation of the proxy server. It is used for Squid debugging, performance monitoring, and troubleshooting.

Remediation:

  • use logrotate to automatically manage and retain logs as specified. Below is an example logrotate configuration for Squid logs:
[root@localhost ~]# vim /etc/logrotate.d/squid
...

/var/log/squid/*.log {
    daily
    rotate 30
    compress
    notifempty
    missingok
    nocreate
    dateext
    sharedscripts
    postrotate
      # Ask Squid to reopen its logs. (logfile_rotate 0 is set in squid.conf)
      # Errors are redirected to make it silent if Squid is not running
      /usr/sbin/squid -k rotate 2>/dev/null
      # Wait a little to allow Squid to catch up before the logs are compressed
      sleep 1
    endscript
}
  • Logs files after logrotate
[root@localhost ~]# ls -al /var/log/squid
total 342364
drwxrwx---.  2 squid root      4096 Oct 31 03:08 .
drwxr-xr-x. 13 root  root      4096 Oct 29 03:21 ..
-rw-r-----.  1 squid squid    94241 Oct 31 10:22 access.log
-rw-r-----.  1 squid squid      153 Oct 23 13:48 access.log-20231023.gz
-rw-r-----.  1 squid squid    17695 Oct 24 03:37 access.log-20231024.gz
-rw-r-----.  1 squid squid    28262 Oct 25 03:05 access.log-20231025.gz
-rw-r-----.  1 squid squid    24459 Oct 26 03:45 access.log-20231026.gz
-rw-r-----.  1 squid squid    23465 Oct 27 03:47 access.log-20231027.gz
-rw-r-----.  1 squid squid    24322 Oct 28 03:37 access.log-20231028.gz
-rw-r-----.  1 squid squid    22576 Oct 29 03:20 access.log-20231029.gz
-rw-r-----.  1 squid squid    22012 Oct 30 03:18 access.log-20231030.gz
-rw-r-----.  1 squid squid    29883 Oct 31 03:07 access.log-20231031.gz
...

12. Tips

12.1. Completed Squid configuration

< squid.conf >

acl Safe_ports port 80              # http
acl Safe_ports port 443             # https

# Method Setting
acl Safe_methods method GET POST OPTIONS CONNECT # HTTP request method [fast]

#
# ACL For Server
#
# ec2 server 
acl ec2-server-src src "/etc/squid/acl/ec2-servers-src.acl"
# ec2 server outbound URL
acl ec2-server-dst dstdomain "/etc/squid/acl/ec2-servers-dst-commons.acl"
# Linux dnf/yum linux pkg update manager
acl pkg-update-user-agent browser -i libdnf yum


# Deny requests to certain unsafe ports
http_access deny !Safe_ports

# Only allow cachemgr access from localhost
http_access allow localhost


#
# HTTP Access Policy
#

# ACL outbound Server Common URLs
http_access allow Safe_methods ec2-server-src ec2-server-dst
# ACL outbound Server Linux pkg-Updates
http_access allow Safe_methods ec2-server-src pkg-update-user-agent


# And finally deny all other access to this proxy
http_access deny all

# Squid normally listens to port 3128
http_port 3128

#
# Uncomment and adjust the following to add a disk cache directory.
#
cache_dir ufs /var/spool/squid 50000 16 256

# Leave coredumps in the first cache dir
coredump_dir /var/spool/squid

#
# Add any of your own refresh_pattern entries above these.
#
refresh_pattern ^ftp:           1440    20%     10080
refresh_pattern ^gopher:        1440    0%      1440
refresh_pattern -i (/cgi-bin/|\?) 0     0%      0
refresh_pattern .               0       20%     4320

#
# Log Format
#
logformat custom_log %{%Y-%m-%d %H:%M:%S}tl %>a:%>p %Ss/%03>Hs:%Sh "%rm %ru HTTP/%rv" %mt %>Hs %<st %tr "%{User-Agent}>h" "%{Referer}>h"
access_log /var/log/squid/access.log custom_log

#
# Security Configuration
#

httpd_suppress_version_string on
via off
forwarded_for delete
follow_x_forwarded_for deny all
request_header_access X-Forwarded-For deny all
reply_header_access X-Cache deny all
reply_header_access X-Cache-Lookup deny all
reply_header_access Server deny all

12.2. Proxying for Linux yum package updates

When performing Linux yum or dnf package updates through a Squid proxy, it is often necessary to specify all the URLs that yum or dnf may access, which can be a cumbersome and error-prone task.

However, you can take advantage of the User-Agent information provided by these package managers to simplify the access control configuration in Squid.

Here's how you can do it:

Remediation:

  • In your squid.conf configuration file, define an access control list (ACL) for dnf/yum Linux package update managers based on the User-Agent:

< squid.conf >

# ACL for dnf/yum linux pkg update manager
acl pkg-update-user-agent browser -i libdnf yum

# ACL outbound Server Linux pkg-Updates
http_access allow Safe_methods avd-server-src pkg-update-user-agent

This configuration ensures that Squid allows access to URLs requested by package managers based on their User-Agent information, eliminating the need to explicitly manage URL lists.

This approach simplifies the configuration and ensures that requests from package managers such as yum and dnf are correctly routed through the proxy.

Here's an example of the Squid access log showing this configuration in action:

# cat /var/log/squid/access.log
...

2023-11-03 14:57:04 10.10.120.10:54326 NONE/503:HIER_NONE "CONNECT mirrors.rockylinux.org:443 HTTP/1.1" - 503 0 0 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-11-03 14:57:04 10.10.120.10:54334 NONE/503:HIER_NONE "CONNECT mirrors.rockylinux.org:443 HTTP/1.1" - 503 0 0 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
2023-11-03 14:57:04 10.10.120.10:54346 NONE/503:HIER_NONE "CONNECT mirrors.rockylinux.org:443 HTTP/1.1" - 503 0 0 "libdnf (Rocky Linux 8.8; generic; Linux.x86_64)" "-"
...
2023-11-03 16:02:03 10.100.120.11:43496 TCP_MISS/200:HIER_DIRECT "GET http://nginx.org/packages/centos/7/x86_64/repodata/4395bce9c52aa8a4cc475e180bcce2399c8a4d720b16ce726d6fded994a7f89b-primary.sqlite.bz2 HTTP/1.1" application/octet-stream 200 88823 709 "urlgrabber/3.10 yum/3.4.3" "-"
2023-11-03 16:02:09 10.100.120.11:43508 TCP_HIT/200:HIER_NONE "GET http://nginx.org/packages/centos/7/x86_64/RPMS/nginx-1.24.0-1.el7.ngx.x86_64.rpm HTTP/1.1" application/x-redhat-package-manager 200 823278 2 "urlgrabber/3.10 yum/3.4.3" "-"

12.3. Proxying for Windows updates service

Through Squid Proxy, you can also handle Windows Updates. However, it requires some configuration adjustments. The domains and applications used by Windows Updates are known to have SSL pinning applied. Since Squid cannot decrypt the traffic involved in Windows Updates, it bypasses the segments where SSL pinning is active and treats trusted domains as exceptions. To bypass the pinned segments, the SSLBump option is used with the 'splice' mode (becoming a TCP tunnel without decrypting proxied traffic).

Below is an example configuration applied via Squid for WSUS server synchronization with Windows Update, which is functioning well as of April 2024.

Please note that certain domains in the configuration may vary depending on the location/region where the proxy is set up.

Here's configuration:

< squid.conf >

..
....

# define wsus objects
acl wsus-src src "/etc/squid/acl/wsus-src.acl"
acl wsus-dst dstdomain "/etc/squid/acl/wsus-dst.acl"


# define windows update agents
acl windows-pkg-agent browser -i Microsoft-CryptoAPI Microsoft-Delivery-Optimization Microsoft BITS Windows-Update-Agent Microsoft WSUS Server

# Allow outbound for wsus-server
http_access allow Safe_methods wsus-src wsus-dst
http_access allow Safe_methods wsus-src windows-pkg-agent

# Configuration for wsus to windows_update
acl DiscoverSNIHost at_step SslBump1
acl NoSSLIntercept_windows_updates ssl::server_name_regex -i "/etc/squid/acl/sslpin_windowsupdates.nobump"
ssl_bump splice NoSSLIntercept_windows_updates
ssl_bump peek DiscoverSNIHost
ssl_bump bump all

< wsus-dst.acl >

.windowsupdate.com
# au.download.windowsupdate.com
# ctldl.windowsupdate.com
# download.windowsupdate.com

wustat.windows.com
.windowsupdate.microsoft.com

.edge.microsoft.com
.cloudapp.azure.com
.akamaiedge.net

.akamaized.net
# img-prod-cms-rt-microsoft-com.akamaized.net

.microsoft.net
# cxcs.microsoft.net

.digicert.com
# ocsp.digicert.com

.azureedge.net
# edgeassetservice.azureedge.net
# fp-as-nocache.azureedge.net

.msedge.net
# fp.msedge.net
# a-ring.msedge.net

download.microsoft.com
ntservicepack.microsoft.com
support.microsoft.com
emdl.ws.microsoft.com

.api.cdp.microsoft.com
# msedge.api.cdp.microsoft.com

settings-win.data.microsoft.com
.events.data.microsoft.com
# v10.events.data.microsoft.com

.update.microsoft.com
# fe2cr.update.microsoft.com
# slscr.update.microsoft.com

.delivery.mp.microsoft.com
# msedge.b.tlu.dl.delivery.mp.microsoft.com
# fe3.delivery.mp.microsoft.com
# tlu.dl.delivery.mp.microsoft.com

.prod.do.dsp.mp.microsoft.com
.trafficshaping.dsp.mp.microsoft.com
# fe3.delivery.mp.microsoft.com
# geover.prod.do.dsp.mp.microsoft.com
# cp501.prod.do.dsp.mp.microsoft.com
# geo.prod.do.dsp.mp.microsoft.com
# kv501.prod.do.dsp.mp.microsoft.com
# tsfe.trafficshaping.dsp.mp.microsoft.com

.prod.cms.rt.microsoft.com
# query.prod.cms.rt.microsoft.com

www.bing.com
ieonlinews.microsoft.com
arc.msn.com
g.live.com
.weather.microsoft.com
config.edge.skype.com

.msftconnecttest.com
# ipv6.msftconnecttest.com
# www.msftconnecttest.com

oneclient.sfx.ms
nav-edge.smartscreen.microsoft.com
checkappexec.microsoft.com
api.msn.com
.azr.footprintdns.com
go.microsoft.com

< sslpin_windowsupdates.nobump >

\.windowsupdate\.com
update\.microsoft\.com
update\.microsoft\.com\.akadns\.net
\.windows\.com
\.edge\.microsoft\.com
\.data\.microsoft\.com
\.mp\.microsoft\.com
\.edge\.microsoft\.com
\.rt\.microsoft\.com
\.cdp\.microsoft\.com
\.cloudapp\.azure.com
\.akamaiedge\.net
\.microsoft\.net
\.digicert\.com
\.azureedge\.net
\.akamaized\.net
settings-win\.data\.microsoft\.com
\.events\.data\.microsoft\.com
\.msedge\.net
checkappexec\.microsoft\.com

( Notes )

  • The domain list shown in the configuration is not a hardened adjustment for Windows Updates related domains required for WSUS operation.
  • It roughly allows domains necessary for Windows Updates to function correctly and also allows some basic domains required for Windows usage from the WSUS server. Please refer to this context.

And...

  • If you find this helpful, please the "star"🌟 to support further improvements.

Read Next

About

squid proxy security best practice

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published