Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Where is pfSense support for HTTP/3 and QUIC protocol support?

    Scheduled Pinned Locked Moved General pfSense Questions
    91 Posts 12 Posters 22.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JonathanLeeJ
      JonathanLee @lohphat
      last edited by JonathanLee

      @lohphat Palo Alto recently gained capacity last year for appID to see what the traffic is. Firewalls do have the ability. Give it time PfSense will soon have that ability as well.

      I did a discussion post about this in Firewall class while working on my AA. As Facebook turned it on when I was working with Palo Alto images for assignments the Professor said that it is normal to block the UDP 443 traffic unless it is required.

      Screenshot_20221003-175027.png

      URL blocking and items will be a problem if you let HTTPS3 run. Facebook started tested HTTPS3 today and now is only using this with my IP address. Hypothetically if a triad of major IT companies all start using HTTPS3 at once, example being Google, Facebook, and Cisco. Firewall companies are forced to react. The real question is what is the proper guidelines for security controls and use of HTTPS3 in firewalls. Over many years in the field I have seen this tactic done to force major sales. One can forecast a new product will come out after that protocol is staged for major use. Again, hypothetically, "Cisco's New ____" fill in the blank. ASA with QUIC controls for example. Understanding the movements and planning is important I feel in cybersecurity. Watch out for this protocol. When I worked at NCR we had products that were only allowed to be used with one vendor per contract for a specific amount of years, and no one else. So Google's HTTPS3 proprietary protocol could be licensed to only one firewall vendor for decryption for a specific timeline of for example 5 years maybe Palo Alto could have the decryption rights for it. It is the gray areas we need to watch out for. Investments and the sole investors into the new products get first dibs on such items explicitly. The real question comes back to, what is the Federal Government Guidelines for such a triad of issues Firewalls, Protocols, and Approval of Use.

      Again to look at this within security and corporate network issues, Obscurity is of upmost importance when working with exploits. Antivirus software is finetuned daily to detect specific exploits within the signatures of files. Encoders play a key role in obfuscation for the security of the exploit and it's handlers. Use of encoders gives rise to polymorphism within code, code that is ever changing in its location and signature. To put in other words this is so new that it has not been hardened enough to be left wide open with a firewall. Follow the recommendations until they approve of it's use for secure networks. Nation state actors love the grey areas. For now only allow 443 and 80 with tcp, until explicitly advised that it's safe.

      Ref:
      https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClarCAC

      Make sure to upvote

      lohphatL 1 Reply Last reply Reply Quote 0
      • lohphatL
        lohphat @JonathanLee
        last edited by

        @jonathanlee There's a great playlist describing QUIC at the protocol level. Even with the AppID details of the protocol details, so much of the payload is encrypted that individual URLs are cloaked so that they can't be detected by filters (pfBlockerNG, snort, suricata) -- you have to block the entire QUIC request or nothing, you can't pick it apart.

        HOW QUIC WORKS
        https://www.youtube.com/watch?v=HnDsMehSSY4&list=PLW8bTPfXNGdDcSDSmcfYs3ynYOdc1cXSh

        JonathanLeeJ 2 Replies Last reply Reply Quote 0
        • JonathanLeeJ
          JonathanLee @lohphat
          last edited by JonathanLee

          @lohphat

          HTTPS 3 uses UDP and TCP over port 443

          Current HTTPS uses TCP.

          To disable quic you just block UDP traffic to port 443 and port 80.

          There is a overview of it with Palo Alto and other firewalls.

          Thanks for the reply

          You just close off UDP over 443 to stop it. I did and you can see the QUIC error code with Facebook during testing. After it will default back to TCP use and Facebook runs again.

          That's the current recommendation. Without 443 UDP access it won't work.

          Chrome browser can decrypt it. But yes it is an issue that's why the major firewall companies want it blocked if it's not required.

          Make sure to upvote

          lohphatL 1 Reply Last reply Reply Quote 0
          • JonathanLeeJ
            JonathanLee @lohphat
            last edited by

            @lohphat
            https://youtu.be/QRRHA_5hS2c

            This is amazing they decypt QUIC in this with pen testing software.

            So why isn't SQUID doing this?

            Make sure to upvote

            lohphatL 1 Reply Last reply Reply Quote 1
            • lohphatL
              lohphat @JonathanLee
              last edited by

              @jonathanlee I know what QUIC is and how to block it. That's not the issue. I WANT to allow it but from a list of acceptable domains. That's the problem with pfSense, you can't whitelist QUIC by domain easily. That's my ask, It's going to be complicated to scope out what the QUIC request is asking for and then be able to whitelist "trusted" domains (Google, et al).

              1 Reply Last reply Reply Quote 0
              • lohphatL
                lohphat @JonathanLee
                last edited by

                @jonathanlee This works because the TLS 1.3 keys are being captured at the host where the QUIC request is originating from.

                A gateway (pfSense, PANs, Cisco, etc.) don't have access to those client keys UNLESS there's a capture agent on each host -- OR all the host keys have some sort of enterprise PKI management in place to escrow client keys on the fly.

                This is a hard problem to tackle.

                P JonathanLeeJ 2 Replies Last reply Reply Quote 0
                • P
                  Patch @lohphat
                  last edited by

                  Perhaps using pfblocker to create and alias native for the ASN then include that in the black or white list for the QUIC rule

                  JonathanLeeJ stephenw10S lohphatL 3 Replies Last reply Reply Quote 3
                  • JonathanLeeJ
                    JonathanLee @lohphat
                    last edited by

                    @lohphat PfSense open source community can do it. Just you watch. . . . Soon viruses will be stomped out. They have to have an http get request in there that is easily accessible, something. I can't wait to see the solution to it.

                    Make sure to upvote

                    1 Reply Last reply Reply Quote 0
                    • JonathanLeeJ
                      JonathanLee @Patch
                      last edited by JonathanLee

                      @patch maybe some form of adapting attestation that is being used with the TPM chips? TPM key attestation?

                      Make sure to upvote

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator @Patch
                        last edited by

                        @patch said in Where is pfSense support for HTTP/3 and QUIC protocol support?:

                        Perhaps using pfblocker to create and alias native for the ASN then include that in the black or white list for the QUIC rule

                        Exactly that ^.

                        lohphatL 2 Replies Last reply Reply Quote 1
                        • lohphatL
                          lohphat @stephenw10
                          last edited by

                          This post is deleted!
                          1 Reply Last reply Reply Quote 0
                          • lohphatL
                            lohphat @stephenw10
                            last edited by lohphat

                            @stephenw10 I didn't know pfBlocker could be used to create aliases which could then be used by a normal f/w rule. Interesting. I'm found a link to walk me though this. Thanks!

                            https://dannyda.com/2021/04/22/how-to-block-asn-autonomous-system-number-with-pfsense-firewall-how-to-block-an-organization-using-pfsense/

                            UPDATE: The linked tutorial demo uses an older pfB UI, I had to change the Action to "Alias Native" so the aliases (I did a v4 and v6 list) are created aren't deduped with the other pfBl lists.

                            Also note the pfBLocker help text doesn't mention these new list action modes of Alias Deny/Permit/Match/Native either and needs updating, In only mentions "Alias Only"

                            https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html

                            1 Reply Last reply Reply Quote 1
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              ASN aliases are usually better for blocking than allowing because they rely on the organisation in question maintaining them and can often be incomplete.
                              You only need to block 80% of IPs to make something unusable but you need to allow a lot more than that to make it usable. But it can work.

                              Steve

                              lohphatL 1 Reply Last reply Reply Quote 0
                              • lohphatL
                                lohphat @stephenw10
                                last edited by lohphat

                                @stephenw10 So I've created pfB IPv4 and IPv6 aliases for Google to pass then log all other requests to see who else is using it.

                                I don't use FB so I don't mind blocking their use of QUIC ;-)

                                UPDATE: After permitting AS15169 [ GOOGLE, US ] (for YouTube traffic) the only other ASN logged during YT testing was AS13335 [ CLOUDFLARENET, US ].

                                Not too surprising since they're a CDN.

                                UPDATE: Google is also using IP blocks not associated with an ASN for YouTube QUIC traffic. This MAY be their ad servers.

                                NetRange: 34.64.0.0 - 34.127.255.255
                                CIDR: 34.64.0.0/10
                                NetName: GOOGL-2
                                NetHandle: NET-34-64-0-0-1
                                Parent: NET34 (NET-34-0-0-0-0)
                                NetType: Direct Allocation
                                OriginAS:
                                Organization: Google LLC (GOOGL-2)
                                RegDate: 2018-09-28
                                Updated: 2018-09-28

                                I knew this was going to be like this...hunting down scopes of addressing per whitelisted domain. So I'm not too discouraged and it's become a bit of a learning experience.

                                1 Reply Last reply Reply Quote 1
                                • lohphatL
                                  lohphat @Patch
                                  last edited by lohphat

                                  @patch Done! And it's working as expected. Thanks for the tip as it's NOT obvious that pfBlockerNG can be used this way (ASN lookup and enumeration) to create aliases for regular f/w rules.

                                  UPDATE: There seems to be a bug/feature in the pfBlockerNG-devel where the Alias list isn't including custom CIDR network lists with the ASNs. I have had to duplicate all the rules so that the ASNs are enumerated in one alias and the CIDR blocks in another instead of being generated in the same alias list.

                                  Alias Native not combining ASN enumeration with custom list in same rule

                                  1 Reply Last reply Reply Quote 3
                                  • Sergei_ShablovskyS
                                    Sergei_Shablovsky
                                    last edited by Sergei_Shablovsky

                                    I wrote about this around YEAR+ ago Using BBR2, QUIC, RACK Congestion Control (CC) protocols in pfSense, so it’s time to wake up for someone ;)

                                    Take my congrats ;)

                                    Moreover, still thinking that initiatives like ZTNA become more popular (40% grow in 1 year for now) + widely using the QUIC protocol bring us a lot of surprises and a lot of Manual work in firewalling and IDS-ing traffic.

                                    —
                                    CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                    Help Ukraine to resist, save civilians people’s lives !
                                    (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                    1 Reply Last reply Reply Quote 1
                                    • JonathanLeeJ
                                      JonathanLee
                                      last edited by JonathanLee

                                      QUIC is starting to run on Facebook has been for sometime however it was developmental before now it seems like a requirement at times...

                                      Again 17.248.245.134 is apple... why does it turn on with Facebook running??

                                      QUIC.PNG

                                      Squid seems to already be working on a solution I don't know if this helps. Squid might become more useful very soon with splice mode only.

                                      https://github.com/squid-cache/squid/pull/919

                                      Make sure to upvote

                                      1 Reply Last reply Reply Quote 0
                                      • JonathanLeeJ
                                        JonathanLee
                                        last edited by JonathanLee

                                        @stephenw10 I can the pcap on pfsense.

                                        HTTP/3 is no longer experimental and is fully active in the iMac it can no longer be disabled manually

                                        2017--> was still in development
                                        Screenshot 2024-07-10 at 20.05.52.png

                                        2021--> This was the background and code for how it works with applications
                                        https://developer.apple.com/videos/play/wwdc2021/10094/?time=16

                                        2024--> Apple has fully activated this on the Sonoma 14.5 and Safari 17.5 it has no option to disable like the link above has.

                                        It also has HTTP/3 DNS much like DoH however pure UDP let's call it DoH/3

                                        DoH/3 seen here:
                                        f065612b-98b0-4959-9e37-68c032208922-image.png

                                        Make sure to upvote

                                        1 Reply Last reply Reply Quote 0
                                        • First post
                                          Last post
                                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.