Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Blocking Internet access via specific browser

    Scheduled Pinned Locked Moved General pfSense Questions
    26 Posts 6 Posters 8.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      fsansfil
      last edited by

      Using Snort

      alert ip any any <> any any (msg:"appID Opera/Opera Mini"; appid: opera opera_mini; classtype:policy-violation; sid:13465012; rev:1;)

      F.

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        @fsansfil:

        Using Snort

        I'd rather leave those Opera Mini people browse whatever they wish than break everyone else on the way…

        1 Reply Last reply Reply Quote 0
        • F
          fsansfil
          last edited by

          Opera Mini people are a dangerous kind… ;)

          "I just want to know whether it is possible to block "X-Forwarded-For" traffic in pfsense? If so then how to do it  :)"

          You can use this rule too...

          alert tcp $HOME_NET any -> $EXTERNAL_NET $FILE_DATA_PORTS (msg:"No Proxied or Random Agent Spoofer"; content:"X-Forwarded-For"; http_header; classtype:policy-violation; sid:13465013; rev:1;)

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            Seriously, have you investigated some saner approaches? Like, blocking outgoing DNS except for whitelisted servers via firewall rules?

            1 Reply Last reply Reply Quote 0
            • N
              networkinggeek
              last edited by

              @doktornotor:

              Seriously, have you investigated some saner approaches? Like, blocking outgoing DNS except for whitelisted servers via firewall rules?

              I tried blocking the DNS queries by adding the following rules
              Rule 1
              Action: Pass
              Protocol: TCP/UDP
              Src: Any
              Src Port: Any
              Dest: Lan Address
              Port : 53 (DNS)

              Rule 2
              Action: Block
              Protocol: TCP/UDP
              Src: Any
              Src Port: Any
              Dest: Any
              Dest Port: 53 (DNS)

              When I enforce these rules I am able to browse the internet normally, but opera mini is still managing to bypass. Either I have done mistake in adding the rules or else opera mini has some really great proxies  :(

              "Mastery isn't a natural gift. Its a daily devotion"

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                How is Opera getting around the firewall?  Just because an IP checker comes up with a different value??  If you have a web proxy set up, surely you've blocked LAN access to 80/443 so that nothing can get out past the filter?  Have you configured WPAD on pfSense?  Opera appears to support WPAD.

                1 Reply Last reply Reply Quote 0
                • N
                  networkinggeek
                  last edited by

                  @KOM:

                  How is Opera getting around the firewall?  Just because an IP checker comes up with a different value??  If you have a web proxy set up, surely you've blocked LAN access to 80/443 so that nothing can get out past the filter?

                  Ok let me explain how Opera and Opera Mini works. The browser has a setting called turbo mode, Opera browser has the option to choose between normal browsing and turbo mode browsing. When in normal mode, it passes through the pfsense, but when turbo mode is enabled it tunnels the traffic through one of its own proxy servers by setting "X-Forwarded-For: IP Address" to serve webpages quickly. On the other hand Opera Mini is by default turbo mode enabled, so it always bypasses the firewall by connecting to its proxy server.

                  @KOM:

                  Have you configured WPAD on pfSense?  Opera appears to support WPAD.

                  I haven't configured WPAD on pfsense. I will try to configure WPAD and check how the Opera mini works.

                  "Mastery isn't a natural gift. Its a daily devotion"

                  1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM
                    last edited by

                    Does Turbo mode actually do anything?  How is fetching content from some proxy somewhere over the Ether faster than fetching it from its original source??  Whatever.

                    https://doc.pfsense.org/index.php/WPAD_Autoconfigure_for_Squid

                    In a nutshell:

                    • create wpad.dat:

                    function FindProxyForURL(url,host)
                    {
                    return "PROXY your.proxy.ip.address:3128";
                    }

                    • copy wpad.dat to /usr/local/www
                    • copy /usr/local/www/wpad.dat to wpad.da, wspad.dat and proxy.pac
                    • create WPAD DNS entry that points to your pfSense box
                    • create DHCP option 252 for WPAD and point it to http://pfsense.host.name/wpad.dat
                    • ensure Autodetect Proxy is set in your browser settings
                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      I'm unsure what you're asking here. Do you want to block all access from opera-mini? Or just the sites blocked for other browsers?
                      Since Opera mini is not the exclusive browser on any device (as far as I know) blocking it completely may be acceptable for you.

                      Steve

                      1 Reply Last reply Reply Quote 0
                      • N
                        networkinggeek
                        last edited by

                        @KOM:

                        Does Turbo mode actually do anything?  How is fetching content from some proxy somewhere over the Ether faster than fetching it from its original source??  Whatever.

                        https://doc.pfsense.org/index.php/WPAD_Autoconfigure_for_Squid

                        In a nutshell:

                        • create wpad.dat:

                        function FindProxyForURL(url,host)
                        {
                        return "PROXY your.proxy.ip.address:3128";
                        }

                        • copy wpad.dat to /usr/local/www
                        • copy /usr/local/www/wpad.dat to wpad.da, wspad.dat and proxy.pac
                        • create WPAD DNS entry that points to your pfSense box
                        • create DHCP option 252 for WPAD and point it to http://pfsense.host.name/wpad.dat
                        • ensure Autodetect Proxy is set in your browser settings

                        I will try this and reply back to the forum  :)

                        "Mastery isn't a natural gift. Its a daily devotion"

                        1 Reply Last reply Reply Quote 0
                        • N
                          networkinggeek
                          last edited by

                          @stephenw10:

                          I'm unsure what you're asking here. Do you want to block all access from opera-mini? Or just the sites blocked for other browsers?
                          Since Opera mini is not the exclusive browser on any device (as far as I know) blocking it completely may be acceptable for you.

                          Steve

                          Sir, I am using pfsense+nsfilter package for URL filtering and YouTube education. I was testing whether filtering is working properly in the desktop/laptops with IE,Chrome, Firefox, Safari and Opera and results were satisfactory. I tested the same in Smartphones and Tablets with the same set of browsers. Apart from Opera Mini every other browser is passing through the firewall and filtering rules are enforced, but in Opera Mini it is completely bypassing the firewall. When I check "What is my IP" in IE, Chrome etc it shows the IP of pfsense, but in Opera mini it is showing different IP. When I went through some docs I found out that Opera Mini appends the header with "X-Forwarded-For" with some different client IP. It is serving webpages through different proxy servers.

                          Have a look at what it is capable of doing

                          http://www.theregister.co.uk/2009/11/24/opera_mini_and_china/

                          "Mastery isn't a natural gift. Its a daily devotion"

                          1 Reply Last reply Reply Quote 0
                          • KOMK
                            KOM
                            last edited by

                            Definitely block 80 and 443 on LAN.  Force everything to use the proxy or else they don't get to talk.

                            Thanks for the article.  I now see that the main purpose of their proxy is to lower the bandwidth required, which may or may not speed up browsing but should lower bandwidth used on mobile.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              Since the Opera proxy is not intended to bypass filtering, that's not its primary purpose, it might be possible to get a list of its proxy IP addresses and just filter all requests to them. That's if disabling Opera-mini completely is an acceptable solution to you.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • D
                                doktornotor Banned
                                last edited by

                                @KOM:

                                How is Opera getting around the firewall?  Just because an IP checker comes up with a different value??

                                It does not use the DHCP assigned DNS server, and it does not use the DHCP assigned proxy either. Kinda obvious when you Google it.

                                1 Reply Last reply Reply Quote 0
                                • KOMK
                                  KOM
                                  last edited by

                                  Kinda obvious when you Google it.

                                  Why should I waste my precious time typing like a sucker when I've got people like you to keep me informed?  ;D

                                  1 Reply Last reply Reply Quote 0
                                  • N
                                    networkinggeek
                                    last edited by

                                    @stephenw10:

                                    I'm unsure what you're asking here. Do you want to block all access from opera-mini? Or just the sites blocked for other browsers?
                                    Since Opera mini is not the exclusive browser on any device (as far as I know) blocking it completely may be acceptable for you.

                                    Steve

                                    I believe blocking Opera Mini is part of the solution, their might be many other browsers which work in similar way.

                                    "Mastery isn't a natural gift. Its a daily devotion"

                                    1 Reply Last reply Reply Quote 0
                                    • N
                                      networkinggeek
                                      last edited by

                                      @KOM:

                                      Definitely block 80 and 443 on LAN.  Force everything to use the proxy or else they don't get to talk.

                                      Thanks for the article.  I now see that the main purpose of their proxy is to lower the bandwidth required, which may or may not speed up browsing but should lower bandwidth used on mobile.

                                      Sir I am little confused here, blocking port 80/443 with anti-lockout rule disabled or with anti-lockout rule enabled?  :-\

                                      "Mastery isn't a natural gift. Its a daily devotion"

                                      1 Reply Last reply Reply Quote 0
                                      • KOMK
                                        KOM
                                        last edited by

                                        blocking port 80/443 with anti-lockout rule disabled or with anti-lockout rule enabled?

                                        Keep the anti-lockout rule enabled and put the blocks below it.

                                        1 Reply Last reply Reply Quote 0
                                        • N
                                          networkinggeek
                                          last edited by

                                          @KOM:

                                          blocking port 80/443 with anti-lockout rule disabled or with anti-lockout rule enabled?

                                          Keep the anti-lockout rule enabled and put the blocks below it.

                                          It is still managing to pass the firewall.
                                          I have attached the screenshots of the rules I have entered, kindly let me know if I have erred in the rules.

                                          After the blocking of port 80/443 I have added IP of our DNS server and blocked rest of them in the next rule.

                                          I have configured NAT or you can say I am Port forwarding the traffic to 3128(HTTP) and 3129(HTTPS)

                                          ![NAT rules.png](/public/imported_attachments/1/NAT rules.png)
                                          ![NAT rules.png_thumb](/public/imported_attachments/1/NAT rules.png_thumb)
                                          ![LAN rules.png](/public/imported_attachments/1/LAN rules.png)
                                          ![LAN rules.png_thumb](/public/imported_attachments/1/LAN rules.png_thumb)

                                          "Mastery isn't a natural gift. Its a daily devotion"

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.