ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Sanity check - DNS Filtering on WAN

    IT Discussion
    8
    48
    5.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DustinB3403D
      DustinB3403
      last edited by DustinB3403

      @JaredBusch thanks for the explanation, it helps to understand it.

      I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

      With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

      scottalanmillerS JaredBuschJ 2 Replies Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @DustinB3403
        last edited by

        @DustinB3403 said in Sanity check - DNS Filtering on WAN:

        @JaredBusch thanks for the explanation, it helps to understand it.

        I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

        With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

        Sort of, but remember DNS is not required. So there are trivial bypasses to DNS filtering in many cases.

        DustinB3403D JaredBuschJ 2 Replies Last reply Reply Quote 0
        • JaredBuschJ
          JaredBusch @DustinB3403
          last edited by

          @DustinB3403 said in Sanity check - DNS Filtering on WAN:

          @JaredBusch thanks for the explanation, it helps to understand it.

          I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

          With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

          The end result is the same, a block page alert, but the task to get there is way different.

          1 Reply Last reply Reply Quote 0
          • DustinB3403D
            DustinB3403 @scottalanmiller
            last edited by

            @scottalanmiller said in Sanity check - DNS Filtering on WAN:

            @DustinB3403 said in Sanity check - DNS Filtering on WAN:

            @JaredBusch thanks for the explanation, it helps to understand it.

            I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

            With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

            Sort of, but remember DNS is not required. So these are trivial to bypasses DNS filtering in many cases.

            Corrected?

            1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch @scottalanmiller
              last edited by JaredBusch

              @scottalanmiller said in Sanity check - DNS Filtering on WAN:

              @DustinB3403 said in Sanity check - DNS Filtering on WAN:

              @JaredBusch thanks for the explanation, it helps to understand it.

              I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

              With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

              Sort of, but remember DNS is not required. So there are trivial bypasses to DNS filtering in many cases.

              Bypassing DNS != Bypassing DNS Filtering

              DNS filtering is completely non trivial to bypass.
              Bypassing DNS is fairly easy but still far from trivial.
              But if filtering is in place, how do you get the real IP to begin with?
              Let's say you bring it with you.
              Then once you know the IP address, just go try to load most website without a working DNS service on your computer.
              It will not work as intended.
              Because damned near every website out there is part of a farm of website or contain tons of code and lookups.
              Those will all fail unless you know each of those IP addresses also.
              Then some are behind things like reverse proxies and without a header will not load the real site either.

              scottalanmillerS 1 Reply Last reply Reply Quote 3
              • scottalanmillerS
                scottalanmiller @JaredBusch
                last edited by

                @JaredBusch said in Sanity check - DNS Filtering on WAN:

                @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                @DustinB3403 said in Sanity check - DNS Filtering on WAN:

                @JaredBusch thanks for the explanation, it helps to understand it.

                I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

                With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

                Sort of, but remember DNS is not required. So there are trivial bypasses to DNS filtering in many cases.

                DNS filtering is completely non trivial to bypass.
                Bypassing DNS is fairly easy but still far from trivial.
                But if filtering is in place, how do you get the real IP to begin with?
                Let's say you bring it with you.
                Then once you know the IP address, just go try to load most website without a working DNS service on your computer.
                It will not work as intended.
                Because damned near every website out there is part of a farm of website or contain tons of code and lookups.
                Those will all fail unless you know each of those IP addresses also.
                Then some are behind things like reverse proxies and without a header will not load the real site either.

                I've worked at plenty of places that use DNS filtering as well as full on content filtering and in both cases, bypassing was pretty trivial. Now you can combine lots of different things and make it pretty tough. But just DNS filtering, I've had people bypass that so trivially it wouldn't even be called effort.

                JaredBuschJ stacksofplatesS 2 Replies Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @scottalanmiller
                  last edited by

                  @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                  @JaredBusch said in Sanity check - DNS Filtering on WAN:

                  @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                  @DustinB3403 said in Sanity check - DNS Filtering on WAN:

                  @JaredBusch thanks for the explanation, it helps to understand it.

                  I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

                  With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

                  Sort of, but remember DNS is not required. So there are trivial bypasses to DNS filtering in many cases.

                  DNS filtering is completely non trivial to bypass.
                  Bypassing DNS is fairly easy but still far from trivial.
                  But if filtering is in place, how do you get the real IP to begin with?
                  Let's say you bring it with you.
                  Then once you know the IP address, just go try to load most website without a working DNS service on your computer.
                  It will not work as intended.
                  Because damned near every website out there is part of a farm of website or contain tons of code and lookups.
                  Those will all fail unless you know each of those IP addresses also.
                  Then some are behind things like reverse proxies and without a header will not load the real site either.

                  I've worked at plenty of places that use DNS filtering as well as full on content filtering and in both cases, bypassing was pretty trivial. Now you can combine lots of different things and make it pretty tough. But just DNS filtering, I've had people bypass that so trivially it wouldn't even be called effort.

                  Trivial means trivial to the masses.

                  I can name a number of ways to get around it. But I am not part of the masses in this regard. I am an IT professional.

                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller @JaredBusch
                    last edited by

                    @JaredBusch said in Sanity check - DNS Filtering on WAN:

                    @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                    @JaredBusch said in Sanity check - DNS Filtering on WAN:

                    @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                    @DustinB3403 said in Sanity check - DNS Filtering on WAN:

                    @JaredBusch thanks for the explanation, it helps to understand it.

                    I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

                    With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

                    Sort of, but remember DNS is not required. So there are trivial bypasses to DNS filtering in many cases.

                    DNS filtering is completely non trivial to bypass.
                    Bypassing DNS is fairly easy but still far from trivial.
                    But if filtering is in place, how do you get the real IP to begin with?
                    Let's say you bring it with you.
                    Then once you know the IP address, just go try to load most website without a working DNS service on your computer.
                    It will not work as intended.
                    Because damned near every website out there is part of a farm of website or contain tons of code and lookups.
                    Those will all fail unless you know each of those IP addresses also.
                    Then some are behind things like reverse proxies and without a header will not load the real site either.

                    I've worked at plenty of places that use DNS filtering as well as full on content filtering and in both cases, bypassing was pretty trivial. Now you can combine lots of different things and make it pretty tough. But just DNS filtering, I've had people bypass that so trivially it wouldn't even be called effort.

                    Trivial means trivial to the masses.

                    I can name a number of ways to get around it. But I am not part of the masses in this regard. I am an IT professional.

                    Well the goal is to block employees and I'm talking about employees that were being blocked working around it without even thinking twice. Sure, it will stop some people, but how many of the ones that you want to stop will it stop? What's the point in blocking if it only blocks a few. And the issue was always... the moment someone knew how to get around it, even those for whom it would be hard to figure out were around it, too.

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                      For example, do a Google that even a non-technical person can and would do (from home, of course, or on their phone) and the first hit is this for getting to what is easily the top non-porn site being blocked...

                      https://www.techperiod.com/how-to-access-blocked-facebook-website-in-office-college-and-school/

                      DustinB3403D Deleted74295D 2 Replies Last reply Reply Quote 1
                      • DustinB3403D
                        DustinB3403 @scottalanmiller
                        last edited by

                        @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                        For example, do a Google that even a non-technical person can and would do (from home, of course, or on their phone) and the first hit is this for getting to what is easily the top non-porn site being blocked...

                        https://www.techperiod.com/how-to-access-blocked-facebook-website-in-office-college-and-school/

                        That was my thought as well DNS filtering is a joke to bypass by its self. "Proper" content filtering with DNS filtering would work well, but is very cumbersome to manage.

                        At least with the examples of either being used. Dans Guardian, Sonic Walls etc.

                        1 Reply Last reply Reply Quote 0
                        • Deleted74295D
                          Deleted74295 Banned
                          last edited by

                          I asked a technical question, with a proposed suggestion on, if I do XYZ, what are the pitfalls. Vauge comments such as "trivial" to get around are really not helpful or suggestions to put in the traditional UTM boxes.

                          The UTMS are stupid, expensive and insanely easy to bypass, they also open the can of worms of decryption of HTTPs traffic.

                          If nobody could send out DNS requests via the WAN unless it's to the DNS filter, How is it trivial to bypass whilst using the same WAN connection.

                          Let's hear specifics rather than vagaries please.

                          1 Reply Last reply Reply Quote 0
                          • Deleted74295D
                            Deleted74295 Banned @scottalanmiller
                            last edited by

                            @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                            For example, do a Google that even a non-technical person can and would do (from home, of course, or on their phone) and the first hit is this for getting to what is easily the top non-porn site being blocked...

                            https://www.techperiod.com/how-to-access-blocked-facebook-website-in-office-college-and-school/

                            Most of those get blocked by DNS filtering at the WAN,The only thing on that list that would work in this case is using their 3G connection as a WAN.

                            1 Reply Last reply Reply Quote 0
                            • stacksofplatesS
                              stacksofplates @scottalanmiller
                              last edited by

                              @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                              @JaredBusch said in Sanity check - DNS Filtering on WAN:

                              @scottalanmiller said in Sanity check - DNS Filtering on WAN:

                              @DustinB3403 said in Sanity check - DNS Filtering on WAN:

                              @JaredBusch thanks for the explanation, it helps to understand it.

                              I am aware that content filtering literally checks the content and even has whitelist / blacklist for sites to allow/block.

                              With DNS Filtering wouldn't this essentially be the same thing, just without the content checking? just a DNS lookup to determine if that dns entry is allowed or not and proceed from there?

                              Sort of, but remember DNS is not required. So there are trivial bypasses to DNS filtering in many cases.

                              DNS filtering is completely non trivial to bypass.
                              Bypassing DNS is fairly easy but still far from trivial.
                              But if filtering is in place, how do you get the real IP to begin with?
                              Let's say you bring it with you.
                              Then once you know the IP address, just go try to load most website without a working DNS service on your computer.
                              It will not work as intended.
                              Because damned near every website out there is part of a farm of website or contain tons of code and lookups.
                              Those will all fail unless you know each of those IP addresses also.
                              Then some are behind things like reverse proxies and without a header will not load the real site either.

                              I've worked at plenty of places that use DNS filtering as well as full on content filtering and in both cases, bypassing was pretty trivial. Now you can combine lots of different things and make it pretty tough. But just DNS filtering, I've had people bypass that so trivially it wouldn't even be called effort.

                              How do you bypass it with your network settings locked down by GPO?

                              Deleted74295D 1 Reply Last reply Reply Quote 0
                              • Deleted74295D
                                Deleted74295 Banned @stacksofplates
                                last edited by Deleted74295

                                @stacksofplates said

                                How do you bypass it with your network settings locked down by GPO?

                                No one is actually saying how they can bypass this. How does GPO take care of every client device, every server, every mobile and tablet? It does not, therefore, we look to the WAN.

                                Port 53 = DNS requests. This is the port that ALL DNS runs on across the planet. On both TCP and UDP.

                                If that port is blocked on the WAN, any requests sent to Google, the ISP, any DNS service you specify, will not function. The only exception to this, is the trusted DNS filter service, it has an exception on the WAN that requests on port 53 can travel there.

                                Internal DNS and active directory carries on as normal, any internal DNS servers you have, are set to externally resolve to the trusted service.

                                stacksofplatesS 1 Reply Last reply Reply Quote 0
                                • Deleted74295D
                                  Deleted74295 Banned
                                  last edited by

                                  https://dnscrypt.org/

                                  This is probably the only thing I can see that gets around it. Moves port 53 requests to 443.

                                  1 Reply Last reply Reply Quote 0
                                  • stacksofplatesS
                                    stacksofplates @Deleted74295
                                    last edited by

                                    @Breffni-Potter said in Sanity check - DNS Filtering on WAN:

                                    @stacksofplates said

                                    How do you bypass it with your network settings locked down by GPO?

                                    No one is actually saying how they can bypass this. How does GPO take care of every client device, every server, every mobile and tablet? It does not, therefore, we look to the WAN.

                                    Port 53 = DNS requests. This is the port that ALL DNS runs on across the planet. On both TCP and UDP.

                                    If that port is blocked on the WAN, any requests sent to Google, the ISP, any DNS service you specify, will not function. The only exception to this, is the trusted DNS filter service, it has an exception on the WAN that requests on port 53 can travel there.

                                    Internal DNS and active directory carries on as normal, any internal DNS servers you have, are set to externally resolve to the trusted service.

                                    I guess I didn't mean GPO specifically. GPO would obviously take care of all Windows machines. You can't change any network settings on Linux without root permissions, and lock down mobile devices with MDM. My point was, how does someone get around this when they can't change their network settings to point to anything else?

                                    Port 53 = DNS requests. This is the port that ALL DNS runs on across the planet. On both TCP and UDP.

                                    Unless I set up an SSH tunnel and a listener to forward UDP packets to whatever port I want. The only thing stopping you at that point is, well nothing. However, that's not trivial.

                                    Internal DNS and active directory carries on as normal, any internal DNS servers you have, are set to externally resolve to the trusted service.

                                    Right, and if the client machines are locked (via GPO or whatever) to those DNS servers, how is it trivial to bypass that (and also when 53 is blocked except for trusted DNS servers.)

                                    Deleted74295D 1 Reply Last reply Reply Quote 0
                                    • stacksofplatesS
                                      stacksofplates
                                      last edited by

                                      Unless I set up an SSH tunnel and a listener to forward UDP packets to whatever port I want. The only thing stopping you at that point is, well nothing. However, that's not trivial.

                                      And for this you would need a Linux machine. You need a fifo device and ncat to pipe each port through the fifo device.

                                      (at least I have no idea how you would do it on Windows, and again it's not trivial)

                                      1 Reply Last reply Reply Quote 0
                                      • Deleted74295D
                                        Deleted74295 Banned @stacksofplates
                                        last edited by

                                        @stacksofplates said

                                        Unless I set up an SSH tunnel and a listener to forward UDP packets to whatever port I want. The only thing stopping you at that point is, well nothing. However, that's not trivial.

                                        What if we block 22 on the WAN?

                                        stacksofplatesS 1 Reply Last reply Reply Quote 0
                                        • stacksofplatesS
                                          stacksofplates @Deleted74295
                                          last edited by

                                          @Breffni-Potter said in Sanity check - DNS Filtering on WAN:

                                          @stacksofplates said

                                          Unless I set up an SSH tunnel and a listener to forward UDP packets to whatever port I want. The only thing stopping you at that point is, well nothing. However, that's not trivial.

                                          What if we block 22 on the WAN?

                                          I'll use a different port. You would have to block every port period.

                                          Deleted74295D 1 Reply Last reply Reply Quote 0
                                          • stacksofplatesS
                                            stacksofplates
                                            last edited by stacksofplates

                                            But again, I'm in agreement with you. The only way to stop this is with non-trivial options. I was asking Scott how this can be done trivially.

                                            (if you can find someone who isn't a Linux admin that's heard of fifo devices, you should probably start using a metal detector on the beach)

                                            stacksofplatesS 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 2 / 3
                                            • First post
                                              Last post