Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Prevent hotspotshield?

    Scheduled Pinned Locked Moved General pfSense Questions
    13 Posts 5 Posters 9.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      fansaty
      last edited by

      Hi all,
      I would like to prevent user to use hotspotshield to pass pfsense. Please tell me how to configure it?
      Thanks.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        Just took a look on their website, doesn't seem to list where it connects to for the vpn.  Or even what type of vpn it is?  PPTP, SSL?

        I would suggest you grab the client, and see where it tries to connect - then block said access.  Be it their IPs, Netblocks or Ports, etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • S
          SeventhSon
          last edited by

          They have L2TP, PPTP and OpenVPN according to their site

          1 Reply Last reply Reply Quote 0
          • M
            matguy
            last edited by

            Realize that if you block that one, they'll just use another.  There's a fairly unlimited number of proxy/VPN services around, and nothing stops someone from simply building their own (from a rented server, or sometimes from their home.)

            Considering you've found that "people" are using it, I assume they're using it to bypass some kind(s) of content filters you have set up.  Often this becomes a policy issue that is solvable by tracking down the offender and applying said employment/student/user policy, or the punitive side of it.

            Also, considering you've found that "people" are using it, if you found it via some sort of logs, you should be able to find where they're connecting to and blocking it.  Then looking for other VPNs and possibly blocking them as they appear (which, if you can't apply a user policy punishment, it'll probably happen.)

            1 Reply Last reply Reply Quote 0
            • J
              jikjik101
              last edited by

              block all ports except those that are needed by your network like 80 or 445.

              or you can install symantec endpoint protection and block the hotspotshield app using hash fingerprints. but i prefer the first one.

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                @SeventhSon:

                They have L2TP, PPTP and OpenVPN according to their site

                Really?  They hide that information pretty good then.. You looking at the same site?  Could you please point that out to me where they give any details at all about there vpn used.  All I can find is "employs the latest VPN technology, and is easy to install and use."

                While I agree with "if you block that one, they'll just use another."  Users can also be really really stupid ;)  You might have a couple of users that said hey if you use this software you can browse porn.

                If said software is then blocked, and say you sent out an email saying attempting circumvention of filtering will be dealt with next time on individual basis - your really going to lower the number of users.

                Also as mentioned only standard ports web ports 80, 443 should be open outbound - others should be on case by case bases, ftp, ssh, etc.

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • M
                  matguy
                  last edited by

                  @johnpoz:

                  While I agree with "if you block that one, they'll just use another."  Users can also be really really stupid ;)  You might have a couple of users that said hey if you use this software you can browse porn.

                  If said software is then blocked, and say you sent out an email saying attempting circumvention of filtering will be dealt with next time on individual basis - your really going to lower the number of users.

                  Also as mentioned only standard ports web ports 80, 443 should be open outbound - others should be on case by case bases, ftp, ssh, etc.

                  We also don't know what "kind" of internet fansaty is providing, either.  Is this workplace, student, "free WiFi"?  There's a good chance that simply blocking all other ports may not be an option depending on what other applications may need access, especially if games need to be allowed, but he's trying to block people circumventing P2P blocks (like in a student housing situation.)

                  1 Reply Last reply Reply Quote 0
                  • F
                    fansaty
                    last edited by

                    Hi all,
                    This week i am rather busy, so i don't track topic continuously.
                    I can prevent user access to xxx web by blacklist template and some specified websites but if user use hotspotshield, they can bypass those filters. My LAN: ADSL Router - pfsense - LAN
                    @jikjik101:

                    block all ports except those that are needed by your network like 80 or 445.

                    or you can install symantec endpoint protection and block the hotspotshield app using hash fingerprints. but i prefer the first one.

                    @matguy:

                    Realize that if you block that one, they'll just use another.  There's a fairly unlimited number of proxy/VPN services around, and nothing stops someone from simply building their own (from a rented server, or sometimes from their home.)

                    Considering you've found that "people" are using it, I assume they're using it to bypass some kind(s) of content filters you have set up.  Often this becomes a policy issue that is solvable by tracking down the offender and applying said employment/student/user policy, or the punitive side of it.

                    Also, considering you've found that "people" are using it, if you found it via some sort of logs, you should be able to find where they're connecting to and blocking it.  Then looking for other VPNs and possibly blocking them as they appear (which, if you can't apply a user policy punishment, it'll probably happen.)

                    @johnpoz:

                    Just took a look on their website, doesn't seem to list where it connects to for the vpn.  Or even what type of vpn it is?  PPTP, SSL?

                    I would suggest you grab the client, and see where it tries to connect - then block said access.  Be it their IPs, Netblocks or Ports, etc.

                    It's hard to carry out it in my case  :-[ because there are many other factors, maybe i will try all cases. Thanks for comments.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      Many other factors like what?  You can not download the free client and sniff to see what its doing?  Do you want to to do it for you and then export the rule base you should put in? :rolleyes:

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • J
                        jikjik101
                        last edited by

                        your default rule should be BLOCK. Then allow only those ports that are needed by your LAN.

                        Example:

                        	 *	 *	 *	 *	 *	 *	 none	  	 Default block LAN to any 
                        

                        Then I will add ALLOW rules on top of my default block.

                        TCP	StaffFullAccess	 *	 *	80       WAN	 none	  	 Allow http on staff pc
                        TCP	StaffFullAccess	 *	 *	443     WAN	 none	  	 Allow https on staff pc
                         *	 *	                         *	 *	 *	  *	         none	  	 Default block LAN to any 
                        

                        In this case, i am sure that my LAN can only access the ports 80 and 443 and no other else.

                        1 Reply Last reply Reply Quote 0
                        • F
                          fansaty
                          last edited by

                          Yeah, maybe i will open each port and then come on so  :) i currently lock the following websites by Proxy filter SquidGuard:
                          hotspotshield.net
                          anchorfree.com
                          openvpn.net
                          anchorfree.net
                          hotspotshield.com
                          www.hsselite.com

                          and block ports by Firewall Rules: 1194, 8245, 8040-8045.

                          Is there anyone checked those ports?

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            Not saying block specific ports, your coming at it from the wrong direction.  Block ALL PORTS, other than standard - ie http, https (80,443) and any other specific ports that might be needed can be normally locked down to the destination.

                            You blocking 1194, can just run on 1193  – there are lots to choose from.  Block them ALL but the standard ports.

                            Sure your proxy can filter based on dest to prevent say 443 being used for the tunnel.  Where you run into trouble is someone running to 443 for openvpn to their home box.  Only way to stop this would be dpi looking for traffic on port that is not really https, and amount of traffic to a location that can not be identified as legit, and then blocking it.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            1 Reply Last reply Reply Quote 0
                            • J
                              jikjik101
                              last edited by

                              johnpoz is correct. Block ALL ports and ONLY allow  the standard ports like 80 and 443.

                              I haven't tried blocking hotspotshield with squidguard since i am running squid in transparent mode.

                              try doing my suggestion and post your results here.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.