Version: SFOS 16.01.2
There appears to be no way to fully disable the transparent web proxy functionality, even when using a FW rule with:
- Scan HTTP: Off
- Decrypt & Scan HTTPS: Off
- Web Policy: "None"
Although no rules are applied to web traffic, and SSL certificates are not changed, the XG firewall still appears to proxy the request in some manner, in the requests are sent to the IP address based on a DNS lookup from XG and not the IP address specified by the client.
Steps to reproduce:
- Create a FW rule with the above proxy settings (should not be proxied at all)
- Add a static DNS entry for a website under "Network" -> "DNS" using a different IP address to the real website (example add an entry for "bbc.co.uk" pointing to the IP address of www.google.co.uk (216.58.210.35)
- Restart "Web Proxy" service under "System Services" -> "Services"
- Browse to the website (https://www.bbc.co.uk)
Expected behaviour:
- The BBC website should be displayed
Actual behaviour:
- Google website is displayed
Summary:
Despite the fact that the client connection should not have been proxied, XG firewall has redirected the client connection to another IP address based on its own DNS lookup, rather than the IP address specified by the client.
Full example:
With a static host entry added on the XG as above, the below commands demonstrate that the client can correctly lookup the IPs of the BBC and Google websites.
$ host www.google.com
www.google.com has address 216.58.210.35
$ host www.bbc.co.uk
www.bbc.co.uk is an alias for www.bbc.net.uk.
www.bbc.net.uk has address 212.58.244.69
The following command demonstrates the client requesting a direct connection to the BBC web server using the explicit IP address and a SNI of "www.bbc.co.uk"
openssl s_client -connect 212.58.244.69:443 -servername www.bbc.co.uk
Certificate chain
Certificate chain
0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=google.com
i:/C=US/O=Google Inc/CN=Google Internet Authority G2
1 s:/C=US/O=Google Inc/CN=Google Internet Authority G2
i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority […]
Here it can be seen that the SSL certificate returned is that of the Google website. Clearly the XG has redirected the request based on its static host entry.
We are currently trailing XG firewall and this is causing problems with our "guest only" wifi, as the XG uses internal DNS servers and the wifi clients use public DNS servers. In our cases it is causing our own websites to be accessed internally rather than external from the guest wifi, breaking things like VPN access (DirectAccess) and web mail.
This will also prevent any clients using static host entries from accessing the intended website - despite the fact that they should not be being proxied.
Please advise if further details are required.
This thread was automatically locked due to age.