Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

DNS tunnelling through Guest portal

This thread has been viewed 1 times
  • 1.  DNS tunnelling through Guest portal

    Posted Apr 22, 2014 06:25 AM

    Hi,

     

    I've just installed a new Aruba system and have found i can DNS tunnel out of the captive portal and get web access without authenticating. Is there a way to block this?

     

    thanks.

     



  • 2.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 06:27 AM

    edit your guest-logon (or pre captive role) to  block any traffic of DNS - except of the allowed servers.



  • 3.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 06:38 AM

    I'm tunnelling it via the allowed server to the external proxy so sadly i don't think that will help.

     



  • 4.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 06:50 AM

    ?! to the allowed server? please explain , y your guests got access to your allowed server before captive? block it.



  • 5.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:00 AM

    Yes, but i assumed the clients will require DNS so it can redirect to the captive portal via its registered name?

     

    Allowed server = Internal DNS server , that was a bit unclear.

     



  • 6.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:01 AM

    try to use an IP address (not name) for the captive.



  • 7.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:06 AM

    That will break the SSL cert though. We don't won't an untrusted site warning coming up for every guest.

     



  • 8.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:07 AM

    It's a username password captive portal? or e-mail guest login? (in order not to see the cert error,u can choose to use IP ADDRESS and a normal HTTP under the l3 captive portal profile)



  • 9.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:12 AM

    Its the sponsored guest registration page. 

    I'm only just learning the Aruba layout , coming from a Cisco WLC background so my terminology might be a bit off..

     

    https://servername/guest/guest_registration

     

    It also allows you to sign in if you already have an account so not happy with turning encryption off really.

     

    thanks again.

     



  • 10.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:15 AM

    Are u using built-in captive portal on the controler? or r'u using Clearpass Guest loginpage?



  • 11.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:21 AM

    Its via Clearpass.

     



  • 12.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:22 AM

    iam using clearpass with IP address and not name...

    Regarding your issue.Please Wait until someone elase in AirHeads may replay to u.



  • 13.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 07:28 AM

    thanks.

    We drill into all our users not to use anything with a certificate warning so to keep it encrypted we really need to do the name redirect.

     



  • 14.  RE: DNS tunnelling through Guest portal

    EMPLOYEE
    Posted Apr 22, 2014 09:36 AM

    albertay,

     

    You would need a DNS server that specifically detects and blocks this threat.



  • 15.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 09:51 AM

    Does such a product exist?



  • 16.  RE: DNS tunnelling through Guest portal

    EMPLOYEE
    Posted Apr 22, 2014 09:55 AM

    Infoblox says they can do it here:  https://community.infoblox.com/blogs/2014/02/13/dns-tunneling-infoblox-advanced-dns-protection-and-dns-firewall-can-help-stop-data

     

    This is not an endorsement for Infoblox, but they say they can stop it.

     

     

    EDIT:  The only thing you can do on the Aruba side is to allow traffic to your own DNS servers, and then blacklist any user who sends DNS to any other server...

     



  • 17.  RE: DNS tunnelling through Guest portal

    Posted Apr 22, 2014 10:07 AM

    Quite an expensive solution for the problem sadly.

    Its quite an annoying little hole in the whole setup.

     



  • 18.  RE: DNS tunnelling through Guest portal

    Posted Apr 23, 2014 07:26 PM

    Your firewall may have DNS analysis built in. The Cisco-ASA line stope some forms of DNS tunneling.

    Our old Watchguard also did. Check with your firewall team.



  • 19.  RE: DNS tunnelling through Guest portal

    Posted Nov 17, 2016 07:03 PM

    Your firewall may have DNS analysis built in. The Cisco-ASA line stope some forms of DNS tunneling.

    Our old Watchguard also did. Check with your firewall team.



  • 20.  RE: DNS tunnelling through Guest portal

    Posted Nov 18, 2016 05:21 AM

    Thanks for the response, but as stated in my original post the Watchguard does not do this (Im the firewall team). Watchguard used to support it a long time back, but for some reason removed it from their portfolio. I have this information direct from Watchguard TAC.

     



  • 21.  RE: DNS tunnelling through Guest portal

    Posted Oct 29, 2014 08:52 AM

    I've checked with Watchguard and they don't provide anything that will stop DNS tunneling currently. Oddly on an older release on a less powerful platform there was something that could be enabled on the CLI..



  • 22.  RE: DNS tunnelling through Guest portal

    Posted Apr 24, 2014 01:45 AM
    I wouldn't turn encryption off, ever, unless I really have to. When you say tunnel and get web access I don't understand, but in your AAA section in your controller configuration for your guest profile you should reference an initial role. That initial role should be configured so that you can only access the captive portal. The initial role should have your captive portal profile applied to it. The captive portal profile is configured under layer 3 authentication.

    My guess is from what you have said, is that you have allowed http access everywhere on your initial role (like your unauthenticated role). Hence the http redirection is not happening to the captive portal. If your ACL allows http access your captive portal redirection will not work.

    Only allow http access to your captive portal! Keep DNS so you can do your cert validation!

    I might be taking nonsense though!


  • 23.  RE: DNS tunnelling through Guest portal

    Posted May 06, 2014 07:20 AM

    F5 DNS is also able to detect and block DNS tunneling. perhaps you got something else around (some example mentioned before) that can help.

     

    it is a hole, but i do wonder how many people will actually use it.