PolarProxy in Podman

Podman is a daemonless Linux container engine, which can be used as a more secure alternative to Docker.
This blog post demonstrates how to run PolarProxy in a rootless container using Podman.
If you still prefer to run PolarProxy in Docker, then please read our blog post “PolarProxy in Docker” instead.

Install Podman and fuse-overlayfs

Install Podman according to the official Podman installation instructions.
Then install fuse-overlayfs, which is an overlay file system for rootless containers.
Fuse-overlayfs can be installed in Debian/Ubuntu with “sudo apt install fuse-overlayfs
and in CentOS with “sudo yum install fuse-overlayfs“.

Create a Podman Image for PolarProxy

Create a Dockerfile with the following contents:


FROM mcr.microsoft.com/dotnet/core/runtime:2.2

EXPOSE 10443

EXPOSE 10080

EXPOSE 57012

RUN
groupadd -g 31337 polarproxy &&
useradd -m -u 31337 -g polarproxy polarproxy &&
mkdir -p /var/log/PolarProxy /opt/polarproxy &&
chown polarproxy:polarproxy /var/log/PolarProxy &&
curl -s https://www.netresec.com/?download=PolarProxy | tar -xzf – -C /opt/polarproxy

USER polarproxy

WORKDIR /opt/polarproxy/

ENTRYPOINT [“dotnet”, “PolarProxy.dll”]

CMD [“-v”, “-p”, “10443,80,443”, “-o”, “/var/log/PolarProxy/”, “–certhttp”, “10080”, “–pcapoverip”, “57012”]

Save the Docker file as “Dockerfile” (no extension) in an empty directory and start a shell in that directory.
Build a PolarProxy Podman image with:

podman build -f Dockerfile -t polarproxy

Test the PolarProxy Podman Image

Take the polarproxy Podman image for a test run. Start it with:

podman run -it –rm –name polarproxy -p 10443 localhost/polarproxy

Establish an HTTPS connection through PolarProxy by running this curl command from another shell on the same machine:

curl –insecure –connect-to www.netresec.com:443:localhost:10443 https://www.netresec.com/

If everything works alright, then curl should output HTML
and the interactive Podman session running the polarproxy image should print something like:

<6>[10443] 127.0.0.1 -> N/A Connection from: 127.0.0.1:44122
<6>[10443] 127.0.0.1 -> www.netresec.com Connection request for: www.netresec.com from 127.0.0.1:44122
<6>[10443] 127.0.0.1 -> www.netresec.com Action: DECRYPT

Create a Podman Container for PolarProxy

Create directories “pcap” and “polarproxy”, where PolarProxy should store the decrypted network traffic and its root CA certificate.


mkdir pcap polarproxy

podman unshare chown 31337:31337 pcap polarproxy

Create a container called “polarproxy”, which has the “pcap” and “polarproxy” directories mounted as volumes.
The service on TCP 10080 will serve the proxy’s public root cert over HTTP.
The localhost:57012 service is a Pcap-over-IP server, from which the decrypted network traffic can be streamed in real-time.

podman create –name polarproxy -v $(pwd)/pcap:/var/log/PolarProxy -v $(pwd)/polarproxy:/home/polarproxy -p 10443 -p 10080 -p 127.0.0.1:57012:57012 localhost/polarproxy

Create and enable a systemd user service that will run the container.


mkdir -p ~/.config/systemd/user/

podman generate systemd -n polarproxy > ~/.config/systemd/user/container-polarproxy.service

systemctl –user enable container-polarproxy.service

Start the systemd user service to activate the PolarProxy container.

systemctl –user start container-polarproxy.service

Verify that the service is running and that you can view the logs from PolarProxy.


systemctl –user status container-polarproxy.service

podman logs polarproxy

Expose PolarProxy to the Network

Create a firewall rule to redirect incoming TCP 443 packets to the PolarProxy service listening on port 10443.

sudo iptables -t nat -A PREROUTING -d 10.11.12.13 -p tcp –dport 443 -j REDIRECT –to 10443

Note: Replace “10.11.12.13” with the IP of the PolarProxy machine

Try making an HTTPS connection via PolarProxy from another PC on the network.

C:\> curl –insecure –resolve www.netresec.com:443:10.11.12.13 https://www.netresec.com/

Note: Replace “10.11.12.13” with the IP of the PolarProxy machine

Don’t forget to save the firewall redirect rule if it is working as desired!

Redirect HTTPS and Trust the Root CA

You can now redirect outgoing TCP 443 traffic from your network to your Podman/PolarProxy host.
Review the “Routing HTTPS Traffic to the Proxy” section on the
PolarProxy page for recommendations on how to redirect outgoing traffic to PolarProxy.

Finally, configure the operating system, browsers and other applications that will get their TLS traffic proxied by PolarProxy
to trust the root CA of the PolarProxy service running in your Podman container.
Follow the steps in the “Trusting the PolarProxy root CA” section of the
PolarProxy documentation in order to install the root cert.

Accessing Decrypted TLS Traffic

You should be able to access PCAP files with the decrypted HTTPS traffic in the “pcap” directory.

It is also possible view the decrypted traffic in real-time by using netcat and tcpdump as a Pcap-over-IP client like this:

nc localhost 57012 | tcpdump -nr – -X

It probably makes more sense to forward the decrypted traffic to an IDS or other type of network security monitoring tool though.
See our blog post “Sniffing Decrypted TLS Traffic with Security Onion
for instructions on how to use netcat and tcpreplay to send the decrypted traffic to a monitor interface.

PolarProxy in Podman on ARM Linux

PolarProxy can also run on ARM Linux installations, such as a Raspberry Pi.
However, the Dockerfile must be modified slightly in order to do so.

ARM 32-bit / AArch32 / ARMv7


If you’re running an “arm32” Linux OS, then change the download link in the “RUN” instruction to the following URL:

https://www.netresec.com/?download=PolarProxy_linux-arm

ARM 64-bit / AArch64 / ARMv8


If you’re running an “arm64” Linux OS, then change the download link in the “RUN” instruction to the following URL:

https://www.netresec.com/?download=PolarProxy_linux-arm64


Don’t know if you’re running a 32-bit or 64-bit OS?
Run “uname -m” and check if the output says “armv7*” (arm32) or “armv8*” (arm64).

See our blog post “Raspberry PI WiFi Access Point with TLS Inspection” for more details about deploying PolarProxy on a Raspberry Pi.

ʕ•ᴥ•ʔ + 🦭 = 💜

 Share on Facebook   Tweet   Submit to reddit.com

*** This is a Security Bloggers Network syndicated blog from NETRESEC Network Security Blog authored by Erik Hjelmvik. Read the original post at: http://www.netresec.com/?page=Blog&month=2020-10&post=PolarProxy-in-Podman

Recent Posts

Leading the charge against GuptiMiner

Our Threat Labs recently exposed a highly sophisticated malware operation known as “GuptiMiner”, which targets corporate networks specifically. Our team…

3 hours ago

MSP Case Study: GOLINE SA Simplifies Domain Security for Clients in Switzerland with PowerDMARC

Reading Time: 2 min GOLINE SA simplified domain security implementation, maintenance, and management for clients in Switzerland, with PowerDMARC MSP…

5 hours ago

Is Your Password Strong Enough? Brute Force Attack on the Rise!

In today’s technologically advanced world, our online accounts provide access to everything from personal information and funds to professional networks…

7 hours ago

Response to CISA Advisory (AA24-109A): #StopRansomware: Akira Ransomware

AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-109A) which disseminates known Tactics,…

14 hours ago

Y Combinator’s Winter 2024 Cybersecurity, Privacy, and Trust Startups

Analyzing opportunities and challenges for the six cybersecurity, privacy, and trust startups in Y Combinator's Winter 2024 batch.

14 hours ago

Seceon, CompTIA and MSSP Leaders Panel Discussion: Unlocking New MRR with Advanced Cybersecurity Services

The Seceon team is committed to leading the effort to enable MSPs The post Seceon, CompTIA and MSSP Leaders Panel…

15 hours ago