we have banned the http-proxy in school to stop them downloading and accessing sites they shouldn't, however they have now found using https based proxies bypasses this.
What is my next possible solution in my ever on going war with students.
Any advice / help much appreciated.
Thanks in advance.
Solved! Go to Solution.
Looking at the URL categorisation for this site in brightcloud it comes up in the "proxy Avoid and Anonymizers" category - so the simplest solution would be to apply a URL filter profile which blockas this category in its entirety (deny) and apply that profil to your outbound interface.
Because it's an atempted SSL connection, the users will get no nice "Access denied" banner because the PA can't do that for HTTPS connections - but it should block them anyway owing to the database categorisation.
Of course, if you don't have a valid web filter license you mgiht be in trouble. :-) I'm not sure if you can still create custom URL filter cetagories without the "general" web filter license, but you could try that also - create a custom URL filter category, add your proxy site to it, set it in a URL filter profile for "deny" with everything else allowed.
Or you could, as suggested, so SSL decrypt and stop them that way.
you could give SSL decrypt a try ?
that will enable you to intercept encrypted traffic and analyse it as any other traffic.
Drawback might be that you either need to get a certificate on your paloalto and have the students import your cert as trusted or have a not-so-nice certificate error appear in their browsers.
You could go for either an SSL decrypt - which would lead to a lot of messay (and very obvious) certificate errors on the client unless yous omehoe force distribute the self signed certificate out of the PA.
Or you could create an Application Filter, add the sub-category Encrypted tunnel to it and add the application fitler to your "deny" rule. This stops most of the commonly identified tunnels - especially if you set it "any" in the service section of the deny rule (which you should do anyway).
in doing that they cannot go to legit SSL sites, essentially if I block SSL they cannot use https-proxy but if I do that they cannot use their webmail or SSL encrypted sites...
Interesting one this..
It might be just beyond the powers of this wonderful product. I wonder if I have found something it cannot actually do, I'd be amazed if that was the case.
What proxies are the students using? In many cases your PA firewall has applications defined to identify well known proxy services (e.g. ultrasurf).
If the students discover a proxy service that is not part of the PA application ecology please open a ticket and let us know so that we can improve the product.
Not true. SSL != Encrypted tunnel.
Have a look through your traffic logs while this is happening. You should see packets which list "protocol" as SSL - but Application as something else.
The PA is smart enough to stop the unallowed applications while allowing "normal" web browsing-based SSL (I.E. banking sites, shopping sites etc).
http-proxy is not required for legitimate SSL sites, as far as I know.
So - create an aplication filter called "tunnelling" or soemthing similar, add the sub-category "encrypted tunnel" to it, and then apply this application filter to a security policy with a DENY rule while leaving (or adding) SSL into your "allow" rule.
Ok I think I need to clarify a little...
The students have found that using sites like https://proximize.me they can go to sites that are normally banned either by URL or APP.
Sadly the BrightCloud URL filter is less than perfect so the students do find proxy sites
dagibbs stated that if I look at the logs I will Protocol as SSL this is not correct. :smileysad:
I have been to this proximize site and browsed around the internet, OK all be it slowly..but it still bypass all application and url filtering not good.
All I see is the protocol TCP (if I am not mistaken the protocol is either TCP or UDP) and application ssl.
So essentially the PA see's their traffic as SSL nothing more than that.
See the PA.jpg below, this is me browsing through the proxy, as you can see web-browsing and SSL are the only ones present, I think the web-browsing is my other browser window open which is normal internet.
So even if I selected 'encrypted-tunnel' it wouldn't make any difference what so ever as the PA is only seeing SSL traffic, its not seeing anything else.
Presently the only way to stop this type of browsing is to block SSL which of course has other implications...
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The Live Community thanks you for your participation!