TLS/SSL SNI extention server name extraction through eBPF #37
Replies: 2 comments
-
the third idea is to attach XDP program to red0/green0 interface to monitor and parse DNS query, when servers/computers in green network initiate HTTPS request to Internet HTTPS site, it must do DNS query first for those HTTPS site, so instead of XDP program to monitor and parse HTTPS clienthello SNI , write the XDP program to parse DNS query name, drops the DNS query name if the query name matches unwanted HTTPS site name. UDP/DNS payload match examples: https://stackoverflow.com/questions/62032878/ebpf-packet-filter-on-payload-matching |
Beta Was this translation helpful? Give feedback.
-
iptables https://noc.org/help/docs/blocking-dns-requests-via-iptables/ |
Beta Was this translation helpful? Give feedback.
-
One user from https://community.ipfire.org/t/allow-squid-transparent-for-ssl-blocking-only/11967?u=vincentmli asked if ipfire could allow/drop outgoing HTTPS request from servers in green network based on the HTTPS request server name which exists in TLS/SSL clienthello SNI extension. This is currently not possible on IPFire and BPFire. There are two ideas I could think of:
Beta Was this translation helpful? Give feedback.
All reactions