This is one of the side projects that I configure and publish to a Docker image. Fundamentally, I configure Squid on Alpine Linux and add SSLBump feature to Squid in this image.
The total size of this image is 8MB. You can get up and running this full feature web proxy in a minute or so.
The SSLBump feature is an optional feature in this image, and use this feature with caution.
- Download the latest release and unzip. You may use the command below or do it manually.
curl -s https://api.github.com/repos/alatas/squid-alpine-ssl/releases/latest | grep "browser_download_url.*docker.zip" | head -1 | cut -d : -f 2,3 | cut -d '"' -f 2 | xargs curl -L -o release.zip ; unzip release.zip ; rm release.zip
-
(Optional) Edit
docker-compose.yml
andconf/squid.conf
files -
Download and run the Docker container
docker-compose up
- Change your proxy configuration to http://localhost:3128/ (sslbump disabled) or http://localhost:4128/ (sslbump enabled)
Squid is a proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows and is licensed under the GNU GPL.
Alpine is a Linux distribution which is an independent, non-commercial, general purpose designed for power users who appreciate security, simplicity and resource efficiency. Alpine Linux is built around musl libc and busybox. This makes it smaller and more resource efficient than traditional GNU/Linux distributions. A container requires no more than 8 MB and a minimal installation. It's tiny and more than capable.
Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS) have become essential components of the modern Internet. The confidentiality, integrity, and originality provided by these protocols are critical to allow for delicate communication to take place.
Threat actors have also recognized the benefits of transport security and are increasingly turning to SSL to hide their activities. Attackers, Botnets and even ad-hoc web attacks can use SSL encryption to avoid detection.
With the SSL Bump feature, the squid intercepts the encrypted SSL traffic and encrypts it again to the customer's direction. In other words, when a client browses a secure site, Squid takes the actual web server certificate and establishes an SSL connection to the web server. Then, It sends a new digital certificate to the client that looks like a web server's certificate to it and establishes a secure connection between the browser and the proxy.
The configuration of this image provides two different endpoints to the proxy. One of them is not sslbumped (3128), the other one is sslbump enabled (4128). It's not necessary to use sslbump feature to use squid as a regular web proxy.
SSLBump is an SSL/HTTPS interception. HTTPS interception has ethical and legal issues which you need to be aware of which are follows;
- Some countries do not limit what can be done within the home environment,
- Some countries permit employment or contract law to overrule privacy,
- Some countries require government registration for all decryption services,
- Some countries it is an outright capital offense with severe penalties
- DO SEEK legal advice before using SSLBump feature, even at home.
There are a few settings in the docker-compose.yml
file as follows:
- Ports: There are two TCP endpoint configurations. 3128 is the regular proxy port of squid and it is not sslbump feature enabled. 4128 is the sslbump enabled port. If you want to change local ports to connect, change the first part of the settings. (ex. "8080:3128")
- Environment values: Squid needs a root certificate for the sslbump feature. The following settings are used when the first time root certificate is created. If you need to recreate the root certificate, you need to delete all files in the
cert
folder.CN
: Common name of the certificateO
: Organization of the certificate ownerOU
: Organization unit of the certificate ownerC
: Two letter code of the country
- Folders: There are three different folders that the image is using.
log
folder is used for storing access logs.cache
folder is used for storing proxy cache.cert
folder is used to store the root certificate.
Squid configuration file is located in conf/squid.conf
. You may refer the official documentation of squid before change the file.
If there isn't, a root certificate is created when the first time image is started. All the clients need to trust this certificate. Otherwise, Clients see an error text for all HTTPS sites. Your clients only need the cert/CA.der
file for setup a trust. DON'T DISTRIBUTE the cert/private.pem
file to the clients.
If you need to recreate the root certificate, you need to delete all files in the cert
folder. Then, a new root certificate is created when the image is started.