Solid-Potential / solid-egress-filter

Solid Egress Filter - traffic filtering NAT your network deserves
GNU General Public License v3.0
3 stars 0 forks source link

MITM configuration standard #2

Open mnatan opened 2 years ago

mnatan commented 2 years ago

We want to support 2 whitelist types:

  1. passthrough - does not decrypt HTTPS
  2. inspected - decrypts HTTPS. Requires trusting MITM CA.

By default, we should deny all other traffic

Additionally, MITM supports TCP proxying, so we should be able to create rules for non-HTTP traffic, like LDAP or SMTP.

Definition of done

mnatan commented 2 years ago

MITM proxy supports our whitelist use case like this:

mitmweb --set block_list="/!(~d google.com | ~d facebook.com)/444" --set ignore_hosts="~d google.com | ~d facebook.com"

but ignore_hosts completely removes the access log, which is an issue.

Alternative projects to consider:

Found here: https://github.com/topics/transparent-proxy

mnatan commented 1 year ago

Closing for now - we might revisit this in the future but these projects did not meet our expectations. We will use Squid proxy.