Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Prevent hotspotshield?

    Scheduled Pinned Locked Moved General pfSense Questions
    13 Posts 5 Posters 9.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Just took a look on their website, doesn't seem to list where it connects to for the vpn.  Or even what type of vpn it is?  PPTP, SSL?

      I would suggest you grab the client, and see where it tries to connect - then block said access.  Be it their IPs, Netblocks or Ports, etc.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • S
        SeventhSon
        last edited by

        They have L2TP, PPTP and OpenVPN according to their site

        1 Reply Last reply Reply Quote 0
        • M
          matguy
          last edited by

          Realize that if you block that one, they'll just use another.  There's a fairly unlimited number of proxy/VPN services around, and nothing stops someone from simply building their own (from a rented server, or sometimes from their home.)

          Considering you've found that "people" are using it, I assume they're using it to bypass some kind(s) of content filters you have set up.  Often this becomes a policy issue that is solvable by tracking down the offender and applying said employment/student/user policy, or the punitive side of it.

          Also, considering you've found that "people" are using it, if you found it via some sort of logs, you should be able to find where they're connecting to and blocking it.  Then looking for other VPNs and possibly blocking them as they appear (which, if you can't apply a user policy punishment, it'll probably happen.)

          1 Reply Last reply Reply Quote 0
          • J
            jikjik101
            last edited by

            block all ports except those that are needed by your network like 80 or 445.

            or you can install symantec endpoint protection and block the hotspotshield app using hash fingerprints. but i prefer the first one.

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              @SeventhSon:

              They have L2TP, PPTP and OpenVPN according to their site

              Really?  They hide that information pretty good then.. You looking at the same site?  Could you please point that out to me where they give any details at all about there vpn used.  All I can find is "employs the latest VPN technology, and is easy to install and use."

              While I agree with "if you block that one, they'll just use another."  Users can also be really really stupid ;)  You might have a couple of users that said hey if you use this software you can browse porn.

              If said software is then blocked, and say you sent out an email saying attempting circumvention of filtering will be dealt with next time on individual basis - your really going to lower the number of users.

              Also as mentioned only standard ports web ports 80, 443 should be open outbound - others should be on case by case bases, ftp, ssh, etc.

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • M
                matguy
                last edited by

                @johnpoz:

                While I agree with "if you block that one, they'll just use another."  Users can also be really really stupid ;)  You might have a couple of users that said hey if you use this software you can browse porn.

                If said software is then blocked, and say you sent out an email saying attempting circumvention of filtering will be dealt with next time on individual basis - your really going to lower the number of users.

                Also as mentioned only standard ports web ports 80, 443 should be open outbound - others should be on case by case bases, ftp, ssh, etc.

                We also don't know what "kind" of internet fansaty is providing, either.  Is this workplace, student, "free WiFi"?  There's a good chance that simply blocking all other ports may not be an option depending on what other applications may need access, especially if games need to be allowed, but he's trying to block people circumventing P2P blocks (like in a student housing situation.)

                1 Reply Last reply Reply Quote 0
                • F
                  fansaty
                  last edited by

                  Hi all,
                  This week i am rather busy, so i don't track topic continuously.
                  I can prevent user access to xxx web by blacklist template and some specified websites but if user use hotspotshield, they can bypass those filters. My LAN: ADSL Router - pfsense - LAN
                  @jikjik101:

                  block all ports except those that are needed by your network like 80 or 445.

                  or you can install symantec endpoint protection and block the hotspotshield app using hash fingerprints. but i prefer the first one.

                  @matguy:

                  Realize that if you block that one, they'll just use another.  There's a fairly unlimited number of proxy/VPN services around, and nothing stops someone from simply building their own (from a rented server, or sometimes from their home.)

                  Considering you've found that "people" are using it, I assume they're using it to bypass some kind(s) of content filters you have set up.  Often this becomes a policy issue that is solvable by tracking down the offender and applying said employment/student/user policy, or the punitive side of it.

                  Also, considering you've found that "people" are using it, if you found it via some sort of logs, you should be able to find where they're connecting to and blocking it.  Then looking for other VPNs and possibly blocking them as they appear (which, if you can't apply a user policy punishment, it'll probably happen.)

                  @johnpoz:

                  Just took a look on their website, doesn't seem to list where it connects to for the vpn.  Or even what type of vpn it is?  PPTP, SSL?

                  I would suggest you grab the client, and see where it tries to connect - then block said access.  Be it their IPs, Netblocks or Ports, etc.

                  It's hard to carry out it in my case  :-[ because there are many other factors, maybe i will try all cases. Thanks for comments.

                  1 Reply Last reply Reply Quote 0
                  • johnpozJ
                    johnpoz LAYER 8 Global Moderator
                    last edited by

                    Many other factors like what?  You can not download the free client and sniff to see what its doing?  Do you want to to do it for you and then export the rule base you should put in? :rolleyes:

                    An intelligent man is sometimes forced to be drunk to spend time with his fools
                    If you get confused: Listen to the Music Play
                    Please don't Chat/PM me for help, unless mod related
                    SG-4860 24.11 | Lab VMs 2.8, 24.11

                    1 Reply Last reply Reply Quote 0
                    • J
                      jikjik101
                      last edited by

                      your default rule should be BLOCK. Then allow only those ports that are needed by your LAN.

                      Example:

                      	 *	 *	 *	 *	 *	 *	 none	  	 Default block LAN to any 
                      

                      Then I will add ALLOW rules on top of my default block.

                      TCP	StaffFullAccess	 *	 *	80       WAN	 none	  	 Allow http on staff pc
                      TCP	StaffFullAccess	 *	 *	443     WAN	 none	  	 Allow https on staff pc
                       *	 *	                         *	 *	 *	  *	         none	  	 Default block LAN to any 
                      

                      In this case, i am sure that my LAN can only access the ports 80 and 443 and no other else.

                      1 Reply Last reply Reply Quote 0
                      • F
                        fansaty
                        last edited by

                        Yeah, maybe i will open each port and then come on so  :) i currently lock the following websites by Proxy filter SquidGuard:
                        hotspotshield.net
                        anchorfree.com
                        openvpn.net
                        anchorfree.net
                        hotspotshield.com
                        www.hsselite.com

                        and block ports by Firewall Rules: 1194, 8245, 8040-8045.

                        Is there anyone checked those ports?

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          Not saying block specific ports, your coming at it from the wrong direction.  Block ALL PORTS, other than standard - ie http, https (80,443) and any other specific ports that might be needed can be normally locked down to the destination.

                          You blocking 1194, can just run on 1193  – there are lots to choose from.  Block them ALL but the standard ports.

                          Sure your proxy can filter based on dest to prevent say 443 being used for the tunnel.  Where you run into trouble is someone running to 443 for openvpn to their home box.  Only way to stop this would be dpi looking for traffic on port that is not really https, and amount of traffic to a location that can not be identified as legit, and then blocking it.

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • J
                            jikjik101
                            last edited by

                            johnpoz is correct. Block ALL ports and ONLY allow  the standard ports like 80 and 443.

                            I haven't tried blocking hotspotshield with squidguard since i am running squid in transparent mode.

                            try doing my suggestion and post your results here.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.