This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

At present no reliable way to block Tor Browser?

Although I had enabled "Filter avoidance apps" (app control) as well as SSL inspection, Tor Browser managed to connect to the internet. As Sophos support told me on the phone, this problem seems to be known.

Are there any experiences here in blocking Tor Browser reliably?
Maybe more steps are necessary to block, like outlined here for another manufacturer?



This thread was automatically locked due to age.
Parents Reply
  • First i created a new service (Hosts and services -> Services), like this:


    (
    not sure if the UDP entries are necessary, added them just in case)

    Then i added a new FW rule:

    Finally i made sure no one is able to download the TOR Browser, so i added 'torproject.org' to URL group [Local TLS deny list] (Web -> URL groups)

    The result (for me) is that the TOR Browser does start (most of the times) but browsing is not possible. I've tested with:
    - "Check our Tor Browser Manual" on the opening tab of TOR Browser
    - google.com
    - nu.nl
    - ibm.com
    - sophos.com

    (Also tested on an Android phone as well on an iPhone, both succesfull)

    I'm interested to hear about your findings, succes.

    Grtz, Peter-Paul

Children
  • Thank you,

    I followed your suggestions, but tor is able to connect the internet.

    Maybe I missed something: are the suggested changes all you did or did you something before (like application detection etc.)?

    Here are my rules:

    Honestly, I seriously doubt dropping some TCP/UDP ports is enough to stop tor. It is designed to work around obstacles, you have to use application signatures etc.

    Best regards

    Sacha

  • Sorry, forgot to mention two things:
    1. i did alter the settings mentioned here for better application detection?

    2. i added something to my default web policy (Web -> Policies):

    Grtz, Peter-Paul

  • Hi  

    You have "any service" selected on your rules.  As you have stated TOR is designed to work around proxies and firewalls such as the XG.

    We have to make it harder for them to do so.  As TOR is updated more frequently, we are only able to create signatures based on the files seen in the wild.  The TOR user/dev community will not give us the file before they release it so that we can have signatures created beforehand.  

    So in order to make it harder for TOR to be blocked, you have to limit ports outbound.  For DNS outbound, limit to port and DNS providers.

    There are a lot of posts on here about Psiphon being blocked.  Search for them to see what else has been done to limit that application.

    You should also increase the maximum amount of packets that get scanned before IPS makes a decision on what type of traffic it is.  You can do this by going to the "Console" and running command: set ips maxpkts 100

    Ensure that the following settings have been set on the web proxy:

    Block PUAs

    Enable pharming protection

    Block invalid certificates

    Block unrecognized protocols

    The above settings are in addition to limiting outbound ports/services and locking down any other rules with "any service" to a specific IP.

    Let us know how it goes.

    Thanks!

  • Thank you for your in-depth information. But I didn't get what I'll have to do with my "any service" settings. I am not familiar enough with the general concept. What do I have to do specifically? (Is there a how-to?)

  • Hi,

    you replace "ANY Service" with specific services eg https, http in the proxy rules. SMTP/s and IMAP/s and POP/s in the  mail rules with specific destinations.

    Where you can you change ANY destination to specific destinations which I know is not practical for general internet access.

    Ian

  • Thank you. I got the concept now and narrowed down outbound connections to specific Protokolls and IPs. Now Tor Browser is blocked.

  • It could be as easy as in any other firewall where you can feed the firewall with custom IP block list.

    Then you take one of the multiple list available and that's all, TOR is completely blocked.

    https://www.dan.me.uk/tornodes

    https://check.torproject.org/torbulkexitlist

    The problem is that Sophos XG lack of features that are commonly available in other firewalls.

    Still can't even match what UTM is able to do, what a bad choice to pick Cyberoam over Astaro, 9 years later, Astaro UTM is still better.

  • I was celebrating too soon: in order to get Skype personal working with high quality, I had to open some ranges of UDP and TCP ports (Ports for Skype) because after one week of configuration attemps (How to free skype with SFOS) I couldn't get Skype calls working in combination with SSL decryption. For me, it seems that the XG is pretty useless if you have to block Tor Browser traffic in a reliable way while keeping Skype et al. functional: there's no way to skip SSL decryption based on application, nor there's a way to update tor exit nodes by an external database/list on a regulary basis as l0rdraiden suggested. I am frustrated having invested so much time in a hopeless endeavour. I am missing something?

  • You could simply import the list of the TOR Exit IPs as a Host IP List and block them in the Firewall. That would be a static process. 

    There could be a automated process in pulling those IPs and converting them into XG via XML API. Or you simply copy paste them into Notepad, replace all /r /d with , and put them into the Webadmin. 

     

  • Hi Sacha Roland,

     

    please advise which ports you used to provide Skype access. I would like to try and replicate your issue hopefully with a fix.

    Ian