We have had several students find this new filter work around. It's called Ultra Surf from www.wujie.net
It comes from Ultrareach and has been very hard to stop. Has anyone run into this Anonymous proxy?
We have found the the program runs on port 9666.
We blocked all outbound traffic on 9666. Still will not stop it.
Found a forum that says to block server 67.15.183.30. Still will not stop it.
It has to be some sort of bot that has servers all over the place that it changes ports and server IP's.
Anyone, Anyone?
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
CTO, Convergent Information Security Solutions, LLC
https://www.convergesecurity.com
Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries. Use the advice given at your own risk.
CTO, Convergent Information Security Solutions, LLC
https://www.convergesecurity.com
Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries. Use the advice given at your own risk.
CTO, Convergent Information Security Solutions, LLC
https://www.convergesecurity.com
Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries. Use the advice given at your own risk.
Just give up. IT at my school has tried and failed to beat us. You cannot win.
2008:11:21-23:13:22 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="0" time="61224 ms" request="0xb18ede98" url="91.109.241.179" error="Connection to server timed out"
2008:11:21-23:13:22 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="0" time="60195 ms" request="0xada5c1b0" url="91.121.65.41" error="Connection to server timed out"
2008:11:21-23:13:22 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="0" time="63229 ms" request="0xb2edada8" url="91.127.203.140" error="Connection to server timed out"
2008:11:21-23:13:22 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="0" time="60194 ms" request="0xadafd900" url="88.203.6.227" error="Connection to server timed out"
2008:11:21-23:13:24 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="400" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="2079" time="1 ms" request="0xada5c1b0" url="" error="Received invalid request from client"
2008:11:21-23:13:27 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="0" time="64191 ms" request="0xad8a6170" url="91.111.95.31" error="Connection to server timed out"
2008:11:21-23:13:32 (none) httpproxy[6663]: id="0002" severity="info" sys="SecureWeb" sub="http" name="web request blocked" action="block" method="" srcip="10.254.3.239" user="" statuscode="502" cached="0" profile="REF_DefaultHTTPProfile (Default Proxy)" filteraction=" ()" size="0" time="65138 ms" request="0xb1a5abb0" url="91.55.221.219" error="Connection to server timed out"
As Bruce mentioned, 7.400 includes the ability to decrypt https at the gateway for inspection. There will certainly be a few issues to consider in implementing this function, but it will provide a substantially improved a level of control.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
As Bruce mentioned, 7.400 includes the ability to decrypt https at the gateway for inspection. There will certainly be a few issues to consider in implementing this function, but it will provide a substantially improved a level of control.
Owner: Emmanuel Technology Consulting
Former Sophos SG(Astaro) advocate/researcher/Silver Partner
PfSense w/Suricata, ntopng,
Other addons to follow
yes you do a man in the middle attack on the https connection....not sure how i feel about this because you are intercepting what is supposed to be a direct secured connection between two points now. I can see the utility on the network admin side..but this can also be used to a very detrimental affect by rogue it operators waaaay to easily. Luckily the option to NOT use it exists..so that's the choice i'll make..
The use of MitM decryption is optional, and needs to be used wisely- but the failure to protect systems and employees from the dangers of the Internet can be a crime. This isn't easy, Astaro is trying to provide the tools to help companies secure their infrastructure, but competent personnel making informed decisions are a key to making it work. That's not to downplay the danger of rogue admins- but if you have rogue admins, you have a serious problem regardless of the technology.
I've been deep in compliance issues lately (specifically Massachusetts 201CMR17.00), so I see tools to help companies "cover their assets" as very timely.
BTW, there are new anonymization tools to help protect user identities scheduled for inclusion in 7.400.
Jack, a question about the anonymization tools: Is that to anonymize identities in reporting? I've now run up against public sector problems where by union rule IT depts can track the traffic but not the user's ID (except in cases of illegal activity - where the user can be tracked, but still only within "the rules". Aaaaaaarrrrrrggggghhhhhh).
yes you do a man in the middle attack on the https connection....not sure how i feel about this because you are intercepting what is supposed to be a direct secured connection between two points now. I can see the utility on the network admin side..but this can also be used to a very detrimental affect by rogue it operators waaaay to easily. Luckily the option to NOT use it exists..so that's the choice i'll make..