Block PSIPHON 3

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Block PSIPHON 3

L5 Sessionator

Hi all,

 

Does anybody already try with success to block Psiphon (https://www.psiphon3.com) ?

It's quite easy when psiphon is configured in VPN mode but how can I do that when VPN is not used ?

 

Thanks in advance for sharing.

 

V.

1 accepted solution

Accepted Solutions

L5 Sessionator

Hi all,

 

After opening a case, the answer is: Decryption enabled (blocking unsupported cypher-suite) + denying 'psiphon' application in security policy should be enough.

 

Need to be tested.

 

V.

View solution in original post

14 REPLIES 14

Cyber Elite
Cyber Elite

Hello,

If you use some kind of web filtering, this should be able to block it on your network. I just checked the PAN-DB-URL and that url is:

 

URL
psiphon3.com
Category
Computer and Internet Info
 
So if the product, I dont know its workings, uses the same URL, you should be able to block it.

Hi,

 

URL filtering can't be used because after "installing" the psiphon client, you need to initiate connexion.

These connexions are based on SSL then no URL filtering ... 😞

 

V.

 

Hello,

I do not know how the client works so I cannot see the traffic for myself. However you should still be able to see the URL's eventhough the traffic is SSL. Perhaps a submission for application detection is in order?

 

Custom signatures:

https://live.paloaltonetworks.com/t5/Documentation-Articles/Custom-Application-Signatures/ta-p/58625

 

Submit an application:

http://researchcenter.paloaltonetworks.com/submit-an-application/

 

Hope this helps...

Just in case you do use URL filtering:

 

URL: www.psiphon3.com
Previous category: computer-and-internet-info
You suggested: proxy-avoidance-and-anonymizers
New category: proxy-avoidance-and-anonymizers
The new categorization is available starting with URL DB version: 2015.09.22.220

 

Regards,

HI,

 

Thx for your help.

But it seem it's not enaugh for blocking psiphon 😞

I ask for new app.

 

V.

L5 Sessionator

Hi all,

 

After opening a case, the answer is: Decryption enabled (blocking unsupported cypher-suite) + denying 'psiphon' application in security policy should be enough.

 

Need to be tested.

 

V.

Hi, can you elaborate more of your settings?

 

Decrypting all or just specific sites/url categories?

Hi everyone.

In my experience SSL decryption and blocking the application Psiphon was not enough, it was only the first step. Psihon was stll able to connect. I discovered that Psiphon creates a Proxy service on localhost and changes proxy settings in browser to redirect browser traffic over Psiphon application. Psiphon application then forwards the traffic to the internet by its own sneaky methods:) I did Wireshark analysis and discovered that after SSL connection was blocked by PAN, Psiphon created a gzip encoded streaming tunel over tcp port 80 and PAN recognised it as "web-browsing" which was allowed. I tried to create a custom application but without success.

We successfully blocked the Psiphon by implementing SSL Decryption, blocking Psiphon application in the security policy and also by preventing users from changing their proxy settings using domain group policy.

Creating custom application signature for port 80 traffic and blocking it in the security policy on PAN would be more elegant but my signature caused too many false positives and it was easier to create a group policy.

 

LPM

L1 Bithead

Hello,
from my testing, blocking just Psiphon while using decryption was not enough. If you leave the client to try and connect long enough, it will still connect.
The best results I've got was by blocking the following:
http-proxy
ike
ipsec (not ipsec-udp)
l2tp
psiphon
ssh
ssh-tunnel
unknown-tcp

with application-default

Regards,
Stavros

Community Team Member

There's actually an article about how to block psiphon :

 

How to Block the Psiphon application

 

If you feel it is incorrect please leave a comment there for review.

 

Hope this helps. 

-Kim.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Was it ever stated which category you need to decrypt?  I dont want to decrypt anything except for what it takes to stop Psiphon.

L2 Linker

Hi

I could block the Psiphon, with a security policy denying in application "psiphon/unknown-tcp/ssh" and SSL decrypt and to avoid the AutoProxy I made this

 

Click Run, and type regedit to open the Registry Editor. Find and open HKEY_CURRENT_USER\Software\Psiphon3, and on the right side you will see SkipProxySettings. Set this value to 1 and Psiphon will not automatically configure the system proxy settings. 

 

 

Hi,

additionally the unknown-udp application needs to be updated.

L2 Linker

Hello, Live community!

I'm having the same problem with the Psiphon application. I've blocked it with the following configuration on my NGFW running PAN-OS version 11.1.10-h1 and Content-ID Apps & Threats 9039-9750 and Antivirus 5370-5896 on a test machine (within the domain, with all root CA certificates for decryption😞

1- I created an application filter to group applications labeled like "Proxy Avoidance", as shown below:


APPLICATION FILTER Proxy-Apps

DanielSRomero_0-1763063863887.png

2- Create a denied security policy rule that associates the following applications and the application filter Proxy-Apps applications only to public IP addresses (not RFC-1918) and through any TCP/UDP port as follows:

SECURITY POLICY RULE

DanielSRomero_1-1763064214096.png

3. Create a decryption profile with the following checks enabled for both TLS and SSH traffic:

DECRYPTION PROFILE SSL DECRYPTION > SSL FORWARD PROXY TAB

DanielSRomero_4-1763064582561.png

DECRYPTION PROFILE SSL DECRYPTION > SSL PROTOCOL SETTINGS TAB (TLSv MIN 1.1)

DanielSRomero_5-1763064676679.png

DECRYPTION PROFILE SSH PROXY TAB

DanielSRomero_6-1763064716114.png

4- Create a decryption rule for both TLS traffic (SSL Forward Proxy) and SSH traffic (SSH Proxy) to public IP addresses (non-RFC-1918) through any TCP/UDP port as follows:

DECRYPTION RULES TLS AND SSH TRAFFIC

DanielSRomero_7-1763064925287.png
5- Finally the Test User tried to connect the Psiphon Proxy App, however they keep stuck in Connecting state as shown below:

TEST USER STUCK PSIPHON APP

DanielSRomero_8-1763066109127.png


After this, Psiphon's connection to users on the internal network was blocked. However, when associating S2S or Remote Access VPN protocols such as IKE and IPSec, some users connected to an internal or external gateways may be unable to use these protocols for their connection and be forced to use SSL. In some cases, this can cause latency issues when consuming video and streaming traffic. To address this, a higher-level security rule must be created associating the IKE, IPSec, SSL and panos-global-protect applications to allow such connections only when they reach authorized public or private IP addresses.

Another good question that might arise is: what about users of guest Wi-Fi networks? How do we control their connection to Psiphon or Proxy apps without having the ability to install decrypt certificates or modify registry editor values?

Some alternatives include (always with caution and after testing them in a non-productive environment or time😞

- Using App-ID to prevent connections to the following applications: psiphon, l2tp, ike, ipsec-base, ssh-tunnel, openvpn, tor, dtls, tcp-over-dns, dns-over-https, dns-over-tls, dnscrypt, http-proxy, socks.

- Use URL filtering profiles limiting access to websites categorized as Proxy-Avoidance-and-Anonymizers, Dynamic-DNS, Hacking, etc.

- Block the Quic protocol over any port so that clients cannot use it and instead try to use TLS, allowing the firewall to identify websites using the SNI and CN of the certificates in the Server Hellos packages (SSL decryption is not required).

- Allow traffic to legitimate services through their standard ports, such as SSL/TCP-443 and DNS/UDP|TCP-53, to known destinations, along with DNS security profiles blocking bad categories like Proxy-Avoidance-and-Anonymizers and Newly Registered Domains, and deny everything else.


- Apply Antispyware and Vulnerability Protection profiles to the guest rule. Palo Alto Networks constantly updates its signatures to detect anomalous behavior or negotiation sequences characteristic of Psiphon or obfuscated SSH tunnels, even if the payload is encrypted, Keep your NGFWs updated with the latest Antivirus and APP-ID "Content-ID" signatures.

- Limit bandwidth for guest networks with QoS rules due tunneling applications often manifest as a single, long-running session with very high sustained data usage. If you can't block the application, you can at least mitigate its impact by making the experience very slow and unusable for the user and your firewall will thank you for it..

If you know of other ways to improve your security posture, please let us know in the comments. 👀

Thank you for your time, and I hope this information is helpful. I would appreciate it if you could support me with a like or accept this answer as a solution; that will help me a lot to become a CyberElite! 😁Best Regards,

Daniel Romero
Senior Network/Security Engineer
PANW Partner

  • 1 accepted solution
  • 27573 Views
  • 14 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!