Students, using HTTPS now on Proxies

cancel
Showing results for 
Search instead for 
Did you mean: 

Students, using HTTPS now on Proxies

Not applicable

Hi,

we have banned the http-proxy in school to stop them downloading and accessing sites they shouldn't, however they have now found using https based proxies bypasses this.

What is my next possible solution in my ever on going war with students.

Any advice / help much appreciated.

Thanks in advance.

Darren

1 ACCEPTED SOLUTION

Accepted Solutions

OK.

Looking at the URL categorisation for this site in brightcloud it comes up in the "proxy Avoid and Anonymizers" category - so the simplest solution would be to apply a URL filter profile which blockas this category in its entirety (deny) and apply that profil to your outbound interface.

Because it's an atempted SSL connection, the users will get no nice "Access denied" banner because the PA can't do that for HTTPS connections - but it should block them anyway owing to the database categorisation.

Of course, if you don't have a valid web filter license you mgiht be in trouble. 🙂 I'm not sure if you can still create custom URL filter cetagories without the "general" web filter license, but you could try that also - create a custom URL filter category, add your proxy site to it, set it in a URL filter profile for "deny" with everything else allowed.

Or you could, as suggested, so SSL decrypt and stop them that way.

Cheers.

View solution in original post

19 REPLIES 19

Cyber Elite
Cyber Elite

Hi Darren

you could give SSL decrypt a try ?

that will enable you to intercept encrypted traffic and analyse it as any other traffic.

Drawback might be that you either need to get a certificate on your paloalto and have the students import your cert as trusted or have a not-so-nice certificate error appear in their browsers.

regards

Tom

Tom Piens
PANgurus

Not applicable

I am also in a school enviroment and we setup a proxy application filter and block all the fall into the filter.

L4 Transporter

Darren.

You could go for either an SSL decrypt - which would lead to a lot of messay (and very obvious) certificate errors on the client unless yous omehoe force distribute the self signed certificate out of the PA.

Or you could create an Application Filter, add the sub-category Encrypted tunnel to it and add the application fitler to your "deny" rule. This stops most of the commonly identified tunnels - especially if you set it "any" in the service section of the deny rule (which you should do anyway).

Cheers

Problem is...

in doing that they cannot go to legit SSL sites, essentially if I block SSL they cannot use https-proxy but if I do that they cannot use their webmail or SSL encrypted sites...

Interesting one this..

It might be just beyond the powers of this wonderful product. I wonder if I have found something it cannot actually do, I'd be amazed if that was the case.

Darren

L6 Presenter

What proxies are the students using? In many cases your PA firewall has applications defined to identify well known proxy services (e.g. ultrasurf).

If the students discover a proxy service that is not part of the PA application ecology please open a ticket and let us know so that we can improve the product.

darren.

Not true. SSL != Encrypted tunnel.

Have a look through your traffic logs while this is happening. You should see packets which list "protocol" as SSL - but Application as something else.

The PA is smart enough to stop the unallowed applications while allowing "normal" web browsing-based SSL (I.E. banking sites, shopping sites etc).

http-proxy is not required for legitimate SSL sites, as far as I know.

So - create an aplication filter called "tunnelling" or soemthing similar, add the sub-category "encrypted tunnel" to it, and then apply this application filter to a security policy with a DENY rule while leaving (or adding) SSL into your "allow" rule.

Cheers.

You could also block the destination IPs since odds are they are only used for SSL tunnels, but talk about a cat and mouse game.

Ok I think I need to clarify a little...

The students have found that using sites like https://proximize.me they can go to sites that are normally banned either by URL or APP.

Sadly the BrightCloud URL filter is less than perfect so the students do find proxy sites

dagibbs stated that if I look at the logs I will Protocol as SSL this is not correct. Smiley Sad

I have been to this proximize site and browsed around the internet, OK all be it slowly..but it still bypass all application and url filtering not good.

All I see is the protocol TCP (if I am not mistaken the protocol is either TCP or UDP) and application ssl.

So essentially the PA see's their traffic as SSL nothing more than that.

See the PA.jpg below, this is me browsing through the proxy, as you can see web-browsing and SSL are the only ones present, I think the web-browsing is my other browser window open which is normal internet.

So even if I selected 'encrypted-tunnel' it wouldn't make any difference what so ever as the PA is only seeing SSL traffic, its not seeing anything else.

Presently the only way to stop this type of browsing is to block SSL which of course has other implications...

Thoughts?

Resolved!

SSL Decrypt...

LOVE this PA what a unit...

Smiley Happy

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!