Students, using HTTPS now on Proxies

Reply
Highlighted
Not applicable

Students, using HTTPS now on Proxies

Hi,

we have banned the http-proxy in school to stop them downloading and accessing sites they shouldn't, however they have now found using https based proxies bypasses this.

What is my next possible solution in my ever on going war with students.

Any advice / help much appreciated.

Thanks in advance.

Darren


Accepted Solutions
Highlighted
L4 Transporter

OK.

Looking at the URL categorisation for this site in brightcloud it comes up in the "proxy Avoid and Anonymizers" category - so the simplest solution would be to apply a URL filter profile which blockas this category in its entirety (deny) and apply that profil to your outbound interface.

Because it's an atempted SSL connection, the users will get no nice "Access denied" banner because the PA can't do that for HTTPS connections - but it should block them anyway owing to the database categorisation.

Of course, if you don't have a valid web filter license you mgiht be in trouble. :-) I'm not sure if you can still create custom URL filter cetagories without the "general" web filter license, but you could try that also - create a custom URL filter category, add your proxy site to it, set it in a URL filter profile for "deny" with everything else allowed.

Or you could, as suggested, so SSL decrypt and stop them that way.

Cheers.

View solution in original post


All Replies
Highlighted
L7 Applicator

Hi Darren

you could give SSL decrypt a try ?

that will enable you to intercept encrypted traffic and analyse it as any other traffic.

Drawback might be that you either need to get a certificate on your paloalto and have the students import your cert as trusted or have a not-so-nice certificate error appear in their browsers.

regards

Tom

Tom Piens - PANgurus.com
Find my book at amazon.com/dp/1789956374
Highlighted
Not applicable

I am also in a school enviroment and we setup a proxy application filter and block all the fall into the filter.

Highlighted
L4 Transporter

Darren.

You could go for either an SSL decrypt - which would lead to a lot of messay (and very obvious) certificate errors on the client unless yous omehoe force distribute the self signed certificate out of the PA.

Or you could create an Application Filter, add the sub-category Encrypted tunnel to it and add the application fitler to your "deny" rule. This stops most of the commonly identified tunnels - especially if you set it "any" in the service section of the deny rule (which you should do anyway).

Cheers

Highlighted
Not applicable

Problem is...

in doing that they cannot go to legit SSL sites, essentially if I block SSL they cannot use https-proxy but if I do that they cannot use their webmail or SSL encrypted sites...

Interesting one this..

It might be just beyond the powers of this wonderful product. I wonder if I have found something it cannot actually do, I'd be amazed if that was the case.

Darren

Highlighted
L6 Presenter

What proxies are the students using? In many cases your PA firewall has applications defined to identify well known proxy services (e.g. ultrasurf).

If the students discover a proxy service that is not part of the PA application ecology please open a ticket and let us know so that we can improve the product.

Highlighted
L4 Transporter

darren.

Not true. SSL != Encrypted tunnel.

Have a look through your traffic logs while this is happening. You should see packets which list "protocol" as SSL - but Application as something else.

The PA is smart enough to stop the unallowed applications while allowing "normal" web browsing-based SSL (I.E. banking sites, shopping sites etc).

http-proxy is not required for legitimate SSL sites, as far as I know.

So - create an aplication filter called "tunnelling" or soemthing similar, add the sub-category "encrypted tunnel" to it, and then apply this application filter to a security policy with a DENY rule while leaving (or adding) SSL into your "allow" rule.

Cheers.

Highlighted
Not applicable

You could also block the destination IPs since odds are they are only used for SSL tunnels, but talk about a cat and mouse game.

Highlighted
Not applicable

Ok I think I need to clarify a little...

The students have found that using sites like https://proximize.me they can go to sites that are normally banned either by URL or APP.

Sadly the BrightCloud URL filter is less than perfect so the students do find proxy sites

dagibbs stated that if I look at the logs I will Protocol as SSL this is not correct. :smileysad:

I have been to this proximize site and browsed around the internet, OK all be it slowly..but it still bypass all application and url filtering not good.

All I see is the protocol TCP (if I am not mistaken the protocol is either TCP or UDP) and application ssl.

So essentially the PA see's their traffic as SSL nothing more than that.

See the PA.jpg below, this is me browsing through the proxy, as you can see web-browsing and SSL are the only ones present, I think the web-browsing is my other browser window open which is normal internet.

So even if I selected 'encrypted-tunnel' it wouldn't make any difference what so ever as the PA is only seeing SSL traffic, its not seeing anything else.

Presently the only way to stop this type of browsing is to block SSL which of course has other implications...

Thoughts?

Highlighted
Not applicable

Resolved!

SSL Decrypt...

LOVE this PA what a unit...

:smileyhappy:

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!