Tips to block Yahoo Mail but not other parts of Yahoo

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Tips to block Yahoo Mail but not other parts of Yahoo

L0 Member

I wanted to make a post to the community to see what other people are doing about this issue.  We currently have a support case open with Palo for this and has been open for quite some time.  Long story short, users that have previously logged into a Yahoo account and have a session cookie are able to somehow circumvent security policy and the app sometimes is parsed as App-ID "SSL" instead of "yahoo-mail-base."

 

We are able to recreate this behavior 100% of the time.  The only way we were able to block Yahoo Mail was by selectively decrypting this traffic and blocking the following URL's:

mail.yahoo.com
login.yahoo.com

*.mail.yahoo.com

*.login.yahoo.com

 

Even with the decryption applied, the sessions are still sometimes getting misparsed and users are still able to access Yahoo Mail.  Again, this is directly related to if the user has logged into a Yahoo account before or not; if the person has never previously logged into a Yahoo account, the access is blocked completely.

 

Now since "login.yahoo.com" is on this URL category we created, users are unable to login to Yahoo for other areas (such as Yahoo Finance). 

 

Just seeing if the community has tackled this issue before why we keep trying through traditional support channels.

2 REPLIES 2

L6 Presenter

I have not seen such issue before. So the because the SSL decrypton does not work always the the App-ID does not match correctly the yahoo app-id (Because of this App-ID "SSL" instead of "yahoo-mail-base." maybe the SSL decryption is not happening)?

 

 

Have you focused on why the SSL decryption does not work every time:

 

https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-new-features/decryption-features/enhanced-ssl-d...

 

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloUCAS

 

 

 

Also maybe when the users have accessed the yahoo and when they access it a second time a "secure renegotiation" is triggered and not a full handshake and maybe this causes the firewall not to be able to decrypt the traffic

 

https://live.paloaltonetworks.com/t5/general-topics/disable-ssl-renegotiation/td-p/27979

 

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POJ0CAO&lang=en_US%E2%80%A...

 

 

 

If SSL decryption is the issue test using a Decryption profile to try to stop this:

 

 

 

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-decryption-pr...

 

 

 

 

If the ssl decryption is ok but the issue is with the app-id wrongly watching then better wait for the TAC to fix their APP-ID.

Hello,

I would recommend setting the URL category Web-based Email to block. This way you dont need to mess with custom block url's etc. 

 

Also as mentioned SSL decryption should be enabled, however a lot of URL traffic can be blocked like this since its in the plain text part of the packet.


Regards,

 

  • 3716 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!