HTTPS does not records in Mikrotik log

Hi All,

there is log show in log screen but it show only HTTP requests, can I see HTTPS requests in log screen?

Not sure what you mean about HTTP logs. Did you configure transparent proxy for HTTP and enabled logging? Then yes, it will show.
HTTPS can’t be proxied, so you can’t achieve the same result. HTTPS is encrypted.

Thanks normis for your response.
Yes, logging is active and write on disk and remotely but for example if you request cnn.com it display on log screen >>
Time: Nov 15 11:29:15
IP: 192.168.1.2
Host: web-proxy,account
Facility:
Priority:
Tag:
Message: 192.168.1.99 GET http://cdn.cnn.com/cnnnext/dam/assets/171114072319-libya-smugglers-slave-trade-tripoli-medium-tease.jpg action=allow cache=MISS

<<<
But when you request facebook.com, google.com, youtube.com, etc. there is no thing appear on log because all become “https”

Yes it’s true. HTTPS is encrypted so you can’t trace it. This is the purpose of HTTPS :slight_smile:

Ok, I understand now. is there is a expert way to trace the encrypted HTTPS requests?
because I want to record all breached roles.

This is not possible

Thank you very much Normis

I have to disagree here. As an example, Squid logs the hostname that it proxied the connection to along with the number of bytes transferred.

Hi troffasky,

Could you please give me notes about squid logs to Monitoring of web searches and video viewing by employees especially “https”.

For http yes. How is the squid transparently proxying https without the end user getting problems?

Do you want to break the SSL connection? The only thing you’ll get with HTTPS [edit: if you’re explicitly proxying it] is the hostname that the connection was proxied to and the number of bytes transferred.

1510849421.345   2610 192.168.1.3 TCP_TUNNEL/200 9926 CONNECT i.mt.lv:443 - HIER_DIRECT/2a02:610:7501:1000::197 -
1510849423.908   6511 192.168.1.3 TCP_TUNNEL/200 9417 CONNECT wiki.mikrotik.com:443 - HIER_DIRECT/2a02:610:7501:1000::201 -
1510849423.931   7546 192.168.1.3 TCP_TUNNEL/200 114953 CONNECT wiki.mikrotik.com:443 - HIER_DIRECT/2a02:610:7501:1000::201 -

Having re-read the thread, I have misunderstood. I had assumed the OP was using an explicit proxy not a transparent one.

You can monitor encrypted traffic but there are legal and technical obstacles. You need to a) work out if it’s legal where you are b) get the monitored devices to trust a certificate that you can re-encrypt their traffic with.

I have to disagree here. You can get the same info for transparently proxied https, using squid.
However, configuring “splice/bump” for this is non-trivial.