Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Block port 80 outbound RDP

    Scheduled Pinned Locked Moved General pfSense Questions
    7 Posts 6 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      scottnguyen
      last edited by

      My boss just found out that one of the user is connecting to their home or remote site Windows Server via RDP over port 80.  How can I restrict this particular application (RDP) without affecting real HTTP traffic?  We obviously can't block port 80 - how do we stop the application trying to use HTTP or even HTTPS?

      1 Reply Last reply Reply Quote 0
      • B
        blak111
        last edited by

        You will probably need to implement squid as a transparent proxy server.

        1 Reply Last reply Reply Quote 0
        • S
          scottnguyen
          last edited by

          Would you mind elaborating on how exactly Squid will handle this?  Thanks.

          1 Reply Last reply Reply Quote 0
          • E
            Efonnes
            last edited by

            I suppose the idea was that as a transparent proxy, it would force connections on that port to use the intended protocol, not allowing other protocols over that port.

            1 Reply Last reply Reply Quote 0
            • W
              wallabybob
              last edited by

              I'd ask the boss for the details and his evidence. It would be a shame to put a lot of effort if the user was actually using the https port rather than the http port (for example).

              If there are a small number of servers accessed and they have static IP addresses you could add firewall rules to block (and log?) access to those IP addresses (and ports?).

              @ShadowFlare:

              I suppose the idea was that as a transparent proxy, it would force connections on that port to use the intended protocol, not allowing other protocols over that port.

              Right. If you watch (say by tcpdump) the first few exchanges of a web browser connecting to a server and downloading a page I expect you will see it is quite noticeably different from the similar exchanges with a RDP server.  This could be used to distinguish "real" web accesses from rdp access masquerading as web accesses. This difference might cause a web proxy to choke on the rdp masquerade, effectively blocking it. Alternatively, something like a web proxy (but much simpler) could just log and close the masquerade attempts.

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                Not that it's viable yet, but on 2.0 you should be able to use the layer 7 filtering to pick out non-HTTP traffic going over port 80 and block it.

                Otherwise it's very difficult, if not impossible, to block that kind of traffic.

                Though it is unlikely that a person needs to connect to a web server on a residential network, you could find out what subnet/netblock that the home user's PC is on and block anything to port 80 heading there.

                (Then they could just use a bounce daemon on a real server somewhere, etc, etc.) It's a cat-and-mouse game.

                It's easier to just fire the person for violating employee policies. :)

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • Z
                  zhoffman
                  last edited by

                  Nice Jimp!!

                  Wouldn't it be nice if that really was the protocol!  Make my life easier.

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.