indeed I've test on one of my site with app restriction and there are a few (very few, as 10 packets in several days) psiphon blocked connections. Same, on this site I'm sure noone has installed that on purpose.
I use Sophos XG in my company. Some users pass Sophos Web filter and Application Control with psiphon proxy 3 app. I create new rule Application Controll --> Deny All and Web Filter --> Default all block but psiphon proxy connecting. This is a big big so big problem. Soon all users begin use this program :)
TAC sent me IPS signature FOS 5.2.10 (flen-520-3.0406.pkg) few days back, i thought I was able to blocked psiphon completely but after a few minutes of waiting, psiphon successfully connected. whew!i started to scratched my head again ;)
For the cmd query, in -Labs/psiphon-tunnel-core, there's a simple script to run the consoleclient (psiphon-tunnel-core). Try placing the "consoleclient" in the Psiphon3 "Roaming" folder and run it from there. Be sure that your http proxy port is the same as in the config file. Configuration infos are found here in case you need it: -Labs/psiphon-tunnel-core/psiphon#Config. The rest is all up to the user, but it's not recommended. (And even if this works, you still need to control the proxy for curl "only".)
Wanted to ask if someone has been able to block psiphon on 2023. I have read all posts related to psiphon, provided solutions worked a couple of years ago. But now, i guess the app was updated and firewalls are not able to block Psiphon anymore. Tried to block on 3 different enviroments with same results, also have a rule meeting the last requirements i found:
Yes, these two logs were generated from a connection that psiphon app used to stablish the tunnel. At the beginning, logs show application psiphon and another IP address with action block, but the app keeps "thinking" and at the end it is able to stablish the tunnel with the sites/IP's you can see in the logs. I confirmed the logs are rigth checking "TCP connections" inside "Rosurce Monitor" tool on windows. The service is "psiphon-tunnel-core.exe" and that service stablished the tunnel with the IP's showed in the logs. Also doing a tcpdump for the internal IP address, all web traffic is directed to that IP's, so 100% sure.
Yes, looking for them on internet shows nothing related to psiphon, that makes it very hard to block psiphon. Sometimes psiphon connects to sites categorized as education, religion, web browsing, etc. Things that we can't block.
In regards to "At the beginning, logs show application psiphon and another IP address with action block" can you show those logs - just the standard firewall log view where we can see the action, the source and destination, the port and the application would be enough.
As I understood while researching online, in order to get an psiphon tunnel, you have to know an tunnel end that you connect to. Otherwise, the application connects to some "index" portal and from there it's getting a list that it could possibly connect to. Did I understood correctly or ?
Your customer, should understand that in order for an appliance (firewall or other one), to be able to identify some traffic is coming from some specific application, it should match some signatures as they were defined. In this particular case, maybe Checkpoint can clarify a bit on what they ar looking in Psiphon case. In general those signatures are composed from several little pieces, like url components, client type, specific port, etc. bun in the case of psiphon, there are couple multiple random things, therefore it's not always getting appropriate detection.
I understand signatures involve a lot of variables about traffic. As we are able to use Harmony Endpoint to block this, all customer want is an official answer from CheckPoint saying if it is able to block psiphon or not. Thank you very much for your advices.
In my college, I have a proxy server. Now using psiphon, I can bypass proxy. But problem is, torrent is not working with psiphon. If I am using my cyber roam account, also torrent does not work. Is there any solution for the problem? Thank you.
To block Psiphon, Palo Alto Networks has created an application that can be used in a blocking security policy to prevent these types of connections from bypassing your security. Additional to the application, enable SSL decryption and set to block unsupported cypher suites. The psiphon application in VPN mode behaves exactly like a regular IPsec VPN so this is why we can't block it by just blocking psiphon application in the security policy.
df19127ead