Inspection Policies
Each CONNECT request is tested only once for the applicability of the following entries. The first matching entry is applied, and the rest are ignored.
If the matching entry deems that a DeepScan should not be performed, the CONNECT request is handled WITHOUT inspecting the subsequent requests.
If, however, the matching entry deems a DeepScan should be performed, the connection to the remote web server is security-checked for SSL properties as per the rule in the matched entry.
If the remote web server fails to meet the desired standards, connection to that webserver is terminated.
Note: DeepScan should only be performed on encrypted connections if the underlying application protocol is HTTP. Applications like Google Drive, Subversion Client, WinScp etc., do not work if you attempt a DeepScan on them. SafeSquid comes with some default Inspection policies as follows
Disable SSL scanning for specific websites. Add websites under the BYPASS HTTPS category to bypass SSL inspection
Allow specific websites to be accessed with exceptions. SafeSquid may not have complete trusted CA certificates, in those cases, websites can be accessed with exceptions.
Enforce SSL scanning for all websites.
Enable or Disable the above policies as per the requirement or add a new policy for the new requirement.
Enabled
Enable or Disable this entry
TRUE: Enable this entry.
FALSE: Disable this entry.
Comment
For documentation and future references, explain the relevance of this entry with your policies.
That is, by reading the policies, a future user can understand the purpose of that entry.
Profiles
Specify the Profiles applicable for this entry.
This entry will be applicable only if the connection has any one of the specified profiles.
Leave it Blank, to apply for all connections irrespective of any applied profile.
To avoid application to a connection that has a profile, use a negated profile (!profile).
DeepScan
Decide if you want to enable scanning within encrypted SSL connections matching this entry.
TRUE: Select this option to enable Deep Scanning.
FALSE: Select this option to disable Deep Scanning.
Block Access to Sites which do not have an SSL Certificate
Decide whether Sites that do not have SSL certificates should be blocked or not.
TRUE: This is the default and safe option.
FALSE: Select this option only if you want to allow SSL access to websites without SSL certificates.
Acceptable Errors in SSL Verification
SafeSquid verifies the SSL certificate to remote SSL web servers.
You can specify here, the acceptable level of error.
Only in specific or exceptional cases choose anything besides X509_V_OK.
Block domain mismatch in the website SSL certificate
Decide whether domain name mismatch is to be allowed or not.
SafeSquid validates the DNS and Common Name in the SSL certificates supplied by the remote web server.
Only in exceptional cases set this as FALSE.
TRUE: This is the default and safe option.
FALSE: Select this option only if you want to allow SSL access to websites that are using certificates issued to domains other than the website.
Example
Rule#1
I want to allow websites that are self-hosted with self-signed certificates
Connection with profile “ALLOW SELF SIGNED CERT WEBSITES” will bypass SSL error ERR_SELF_SIGNED_CERT_IN_CHAIN
Save Configuration
No configuration is required in the Setup tab.
Note: In new versions of SafeSquid released after June 2017, the setup tab is removed. You will see only three subsections in the HTTPS inspection section. Setup
List of Security Passphrase(s) or Server Policies required to generate or load an existing ROOT CA SSL Certificate (RCSC).
The first matching entry below is used and the remaining is ignored.
RCSC is automatically created if none exists already.
If an RCSC exists, a passphrase in the applicable entry is used to load it.
The Private key of the generated RCSC can be used only with the passphrase used to generate it.
The passphrase prevents the private key of your RCSC from being stolen or fraudulent use.
After the RCSC has been successfully generated, the public key of your RCSC can be downloaded from http://safesquid.cfg/safesquid.cer
The public key must be installed on all the web clients and browsers that are subjected to Deep Scan.
Click on Add below, to add a new entry.
Enabled
Enable or Disable this entry
TRUE: Enable this entry.
FALSE: Disable this entry.
Comment
For documentation and future references, explain the relevance of this entry with your policies.
Proxy Host
Please enter the hostname of the proxy server as specified in the Startup Parameters.
Encrypted Password
Please enter the Encrypted password for disk-based caching of SSL certificates.
SSL Cache Store Size
Please enter the size of memory to store the SSL session Information.