Hello

For many years now I have been using a DNS black hole setup to stop http/https
connections to blocked websites (well, any connection to those sites).  This has
worked well.

Connections with http are routed to an IP on the internal network which returns
a simple "blocked" web page.

Connections with https come back to the browser complaining of a certificate
error (clearly, the HTTPS certificate of the web-server at the redirected IP
does not have a valid certificate for any blocked site).

This really isn't a big deal; but as more sites have started using https, and as
tools such as relayd and squid (and others?) have developed ways to "inject"
https certificates on the fly, I am wondering if there is a way to create https
certificates based solely on the requested URL in a connection attempt using an
internal CA to avoid the certificate errors with blocked HTTPS connections?

In other words, rather than having an "SSL-MITM" setup, where the proxy goes out
and connects to the ultimate destination before responding to the client with a
forged certificate; all I want is for the "proxy" to generate a certificate for
the requested URL signed by a locally trusted CA, before returning a static
"blocked" webpage.

This (to me) seems simpler than what has already been accomplished with relayd.

I have been looking at relayd, and I don't think it will do what I want (or, at
least, I can't figure it out).  I also have been unable to find anything else
that will help me with this.

Are there any tools available to do what I am looking for?  Or, is there a way
to setup relayd to accomplish this?

Thanks

[demime 1.01d removed an attachment of type application/x-pkcs7-signature which 
had a name of smime.p7s]

Reply via email to