Web Safety 6.2 is Release Candidate

Next version of Web Safety web filter for Squid proxy (version 6.2.0.FD48, built on April 13, 2018, Release Candidate) is now available for download. This version contains the following fixes and improvements:

  • Added new dynamic site categorization module. This module works on both requests and response. When categorizing requests URL, Referer and Host headers are scanned. When categorizing responses – textual contents of pages are scanned. Currently there are dynamic categorizer for Nudity Pornography, Adult Themes Sexuality, Drugs and Gambling categories, but more and more categorizers will be added with each release. We target to finally have all available categories covered.
  • Redesigned and re-implemented deep content inspection engine. The speed of content inspection is a little improved. Detection is now done faster. The amount of used RAM when performing adult language detection is greatly decreased (approx 10 times).

Pre-configured virtual appliance is available from https://www.diladele.com/download_next_version.html (should be run in VMWare ESXi/vSphere or Microsoft Hyper-V). GitHub repo with automation scripts we used to build this virtual appliance from stock Ubuntu 16 LTS image is at https://github.com/diladele/websafety-virtual-appliance/tree/release-6.2.0 .

Direct link to virtual appliance:

Please deploy this version is non too critical environments only. Your questions/issues/bugs are welcome at support@diladele.com. Version 6.3 will include re-implemented Surfing Now page and CTIRU URL prevention list (provided by Home Office UK). You can join our community to get early access to next development builds at https://www.diladele.com/community.html .

Thanks to all of you for making this possible!

Posted in Linux

Web Safety 6.1 web filter plugin for Squid proxy is available

Greetings all,

Next version of Web Safety ICAP web filter for Squid proxy (version 6.1.0.1995 built on January 15, 2018) is now available for download. This version contains the following fixes and improvements:

  • Added URL rewriter for Google Safe Browsing (Update API v4). It is now possible to check each URL for malware and malicious links. You would need to register on Google Cloud Platform and obtain your own API key. More information is at https://developers.google.com/safe-browsing/v4/get-started.
  • Redesigned exclusions in UI. There is only one list of exclusions now. It is possible to further specify what exclusions are needed for each list entry. Supported exclusions are “Skip HTTPS decryption (SSL Bump)”, “Bypass proxy authentication”, “Bypass web filter and antivirus scan”, “Do not cache HTML pages” and “Bypass Google Safe Browsing”.

Pre-configured virtual appliance is available from https://www.diladele.com/virtual_appliance.html (should be run in VMWare ESXi/vSphere or Microsoft Hyper-V). GitHub repo with automation scripts we used to build this virtual appliance from stock Ubuntu 16 LTS image is at https://github.com/diladele/websafety-virtual-appliance/tree/master/scripts.ubuntu16 .

Direct links to virtual appliance:

Your questions/issues/bugs are welcome at support@diladele.com. Next version will include dynamic real-time page categorization using machine learning algorithms. You can join our community to get early access to next development builds at https://www.diladele.com/community.html .

Thanks to all of you for making this possible!

Posted in Linux

Redirecting web traffic from Mikrotik to internal Squid using policy based routing

There is a beginner’s guide on how to set up transparent interception of HTTP and HTTPS traffic in the network with help of external Squid proxy, Mikrotik router and Policy Based Routing.

The tutorial is available at https://docs.diladele.com/tutorials/mikrotik_transparent_squid/index.html Hope it will be helpful.

Best regards,
Dev Team

 

Posted in Linux