Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

When childhood dies, its corpses are called adults. -- Brian Aldiss


aus+uk / uk.telecom.broadband / Accessing web sites that use a TCP port other than 80

SubjectAuthor
* Accessing web sites that use a TCP port other than 80NY
+- Re: Accessing web sites that use a TCP port other than 80Marco Moock
+* Re: Accessing web sites that use a TCP port other than 80Woody
|+* Re: Accessing web sites that use a TCP port other than 80NY
||`* Re: Accessing web sites that use a TCP port other than 80Brian Gregory
|| `* Re: Accessing web sites that use a TCP port other than 80NY
||  `- Re: Accessing web sites that use a TCP port other than 80Rupert Moss-Eccardt
|`* Re: Accessing web sites that use a TCP port other than 80Jason H
| `* Re: Accessing web sites that use a TCP port other than 80NY
|  `* Re: Accessing web sites that use a TCP port other than 80Theo
|   `* Re: Accessing web sites that use a TCP port other than 80Rupert Moss-Eccardt
|    +- Re: Accessing web sites that use a TCP port other than 80Theo
|    `* Re: Accessing web sites that use a TCP port other than 80Chris Green
|     `* Re: Accessing web sites that use a TCP port other than 80Rupert Moss-Eccardt
|      `* Re: Accessing web sites that use a TCP port other than 80Chris Green
|       `* Re: Accessing web sites that use a TCP port other than 80Rupert Moss-Eccardt
|        `- Re: Accessing web sites that use a TCP port other than 80Chris Green
`* Re: Accessing web sites that use a TCP port other than 80Andy Burns
 `- Re: Accessing web sites that use a TCP port other than 80Theo

1
Accessing web sites that use a TCP port other than 80

<U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5153&group=uk.telecom.broadband#5153

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!3.us.feeder.erje.net!feeder.erje.net!border-1.nntp.ord.giganews.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!nntp.brightview.co.uk!news.brightview.co.uk.POSTED!not-for-mail
NNTP-Posting-Date: Mon, 22 May 2023 00:08:41 +0000
Date: Mon, 22 May 2023 01:08:40 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Newsgroups: uk.telecom.broadband
Content-Language: en-GB
From: me@privacy.net (NY)
Subject: Accessing web sites that use a TCP port other than 80
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Antivirus: AVG (VPS 230521-6, 21/5/2023), Outbound message
X-Antivirus-Status: Clean
Message-ID: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
Lines: 32
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-cNfJEcKKzMaSmTV9C8Wa3jBRMoUaiNczIRoSjkWE6AI/D1m8GLvVxBQhF7+tO4ZMk3nN2fy0PErAVB1!9Sh7UvFr2kaCkjLa/7KHMykrvBt1JTBmNTz19rHsdkjO8muf/0JSJCLVLUeIMZtWN780D0hxmXuW!A4H1zN2DO3KIWV7ahEVgYiri
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
 by: NY - Mon, 22 May 2023 00:08 UTC

While I was on a cruise recently, I was using the ship's wifi network
(which gets its backhaul via satellite).

My phone and laptop could access most websites, but not ones which used
a non-standard TCP port (ie not 80).

I've set my router at home to use port forwarding, so

WAN_IP:8080 is routed to LAN_IP_1:80
WAN_IP:9981 is routed to LAN_IP_2:80
WAN_IP:8998 is routed to LAN_IP_3:80

I use DDNS to map a network name to the current value of my WAN IP
address, which my ISP changes from time to time.

And any attempt to access WAN_IP:8080 (or any other of the ports that
I'd configured) timed-out.

It looks as if the ship's network configuration was only allowing
traffic to standard ports such as 80 (for web), 25/110/995 (for POP/SMTP
email) and a few others, and blocking everything else.

I ended up connecting to my always-on Raspberry Pi (at home) over VNC
and then using that to access the LAN_IP_n devices (weather station,
PVR, security camera) from within my home LAN. Or else waiting till the
ship was in a port and using my mobile phone's mobile internet. Thank
goodness they allowed VNC access...

Is there anything I could have done differently in my laptop network
configuration such that I could access web sites that didn't use port
80, when their port numbers were (apparently) blocked by the ship's wifi?

Re: Accessing web sites that use a TCP port other than 80

<u4f13d$237l2$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5154&group=uk.telecom.broadband#5154

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: mo01@posteo.de (Marco Moock)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Mon, 22 May 2023 08:11:57 +0200
Organization: A noiseless patient Spider
Lines: 16
Message-ID: <u4f13d$237l2$1@dont-email.me>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 22 May 2023 06:11:57 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="ebdeabf751c1b9a578936b1b40b413c2";
logging-data="2203298"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19qKNPczJe7dTxUMIxgApac"
Cancel-Lock: sha1:JL04KzOPXrXTmgggbYGnhwi7RVE=
 by: Marco Moock - Mon, 22 May 2023 06:11 UTC

Am 22.05.2023 um 01:08:40 Uhr schrieb NY:

> My phone and laptop could access most websites, but not ones which
> used a non-standard TCP port (ie not 80).

An annoying firewall.

> I've set my router at home to use port forwarding, so
>
> WAN_IP:8080 is routed to LAN_IP_1:80
> WAN_IP:9981 is routed to LAN_IP_2:80
> WAN_IP:8998 is routed to LAN_IP_3:80

You could use IPv6, so you can have multiple machines running on TCP
port 80 on an individual global address.

Re: Accessing web sites that use a TCP port other than 80

<u4f388$23jfm$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5155&group=uk.telecom.broadband#5155

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: harrogate3@ntlworld.com (Woody)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Mon, 22 May 2023 07:48:39 +0100
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <u4f388$23jfm$1@dont-email.me>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 22 May 2023 06:48:40 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="540538e672fa9535762557bb3f37f518";
logging-data="2215414"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/ItLBL8y57eoMPreFb8ecxTDn3Y4VTLfY="
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Cancel-Lock: sha1:1Sk1KtbDJBvcYVNX+aG1dlvYIuw=
In-Reply-To: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
Content-Language: en-GB
 by: Woody - Mon, 22 May 2023 06:48 UTC

On Mon 22/05/2023 01:08, NY wrote:
> While I was on a cruise recently, I was using the ship's wifi network
> (which gets its backhaul via satellite).
>
> My phone and laptop could access most websites, but not ones which used
> a non-standard TCP port (ie not 80).
>
> I've set my router at home to use port forwarding, so
>
> WAN_IP:8080 is routed to LAN_IP_1:80
> WAN_IP:9981 is routed to LAN_IP_2:80
> WAN_IP:8998 is routed to LAN_IP_3:80
>
> I use DDNS to map a network name to the current value of my WAN IP
> address, which my ISP changes from time to time.
>
> And any attempt to access WAN_IP:8080 (or any other of the ports that
> I'd configured) timed-out.
>
> It looks as if the ship's network configuration was only allowing
> traffic to standard ports such as 80 (for web), 25/110/995 (for POP/SMTP
> email) and a few others, and blocking everything else.
>
>
> I ended up connecting to my always-on Raspberry Pi (at home) over VNC
> and then using that to access the LAN_IP_n devices (weather station,
> PVR, security camera) from within my home LAN. Or else waiting till the
> ship was in a port and using my mobile phone's mobile internet. Thank
> goodness they allowed VNC access...
>
> Is there anything I could have done differently in my laptop network
> configuration such that I could access web sites that didn't use port
> 80, when their port numbers were (apparently) blocked by the ship's wifi?

That is an issue when travelling anywhere. Go to France and you will
find free wi-fi around Tourist Information offices and the local Mairie
(Mayor's) office BUT whilst the former is usually open access the latter
more often than not is supplied by Orange France and they block
everything bar port 80. If you use a mail client, forget it, the only
option is webmail.

Was the ship of French parentage by any chance?

Re: Accessing web sites that use a TCP port other than 80

<u4f9f6$24bv3$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5156&group=uk.telecom.broadband#5156

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: me@privacy.invalid (NY)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Mon, 22 May 2023 09:34:46 +0100
Organization: A noiseless patient Spider
Lines: 2
Message-ID: <u4f9f6$24bv3$1@dont-email.me>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain;
format=flowed;
charset="utf-8";
reply-type=response
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 22 May 2023 08:34:46 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="ef8392d972b27df010c77fe7632c4265";
logging-data="2240483"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+8KPflUl3fIOkC++8GNvUqJ+toqUsHnF0="
Cancel-Lock: sha1:CMa9O1m3qo0bklUDll/nQSUtjMw=
Importance: Normal
X-MSMail-Priority: Normal
X-Antivirus: Avast (VPS 230521-6, 21/5/2023), Outbound message
X-Priority: 3
X-Antivirus-Status: Clean
X-MimeOLE: Produced By Microsoft MimeOLE V14.0.8089.726
In-Reply-To: <u4f388$23jfm$1@dont-email.me>
X-Newsreader: Microsoft Windows Live Mail 14.0.8089.726
 by: NY - Mon, 22 May 2023 08:34 UTC

"Woody" <harrogate3@ntlworld.com> wrote in message
news:u4f388$23jfm$1@dont-email.me...
>> Is there anything I could have done differently in my laptop network
>> configuration such that I could access web sites that didn't use port 80,
>> when their port numbers were (apparently) blocked by the ship's wifi?
>
> That is an issue when travelling anywhere. Go to France and you will find
> free wi-fi around Tourist Information offices and the local Mairie
> (Mayor's) office BUT whilst the former is usually open access the latter
> more often than not is supplied by Orange France and they block everything
> bar port 80. If you use a mail client, forget it, the only option is
> webmail.
>
> Was the ship of French parentage by any chance?

No, it was P&O, so *nominally* British. It was fitted with UK 3-pin mains
sockets so it's likely that the firewall would have been configured to UK
specs.

There were several different tariffs of wifi available for purchase on the
ship, and I imagine that the difference was the data-throughput speed and
the TCP ports that were blocked. The Youtube website was accessible but
playing of videos timed-out - not that I'd try to play a video over a slow
laggy connection. On a port-intensive cruise like we were on, there wasn't
too long between being in one port or another and therefore being able to
use mobile internet (with my laptop tethered to my phone).

The other embuggerance with the ship's wifi was that it would only allow one
device at a time to connect to a given user ID, so my wife and I had to kick
each other off the connection. I did take a travel router which I've used in
the past to get round this, but for some reason this time it could not see
the ship's SSID. (*) Maybe the ship have started blocking MAC addresses
which are known to belong to travel routers - is that how MAC-filtering
works, or does the client always see the SSID and only get gets blocked when
it tries to connect?

(*) Every time I scanned for networks, I found that the router (Hootoo) saw
a different subset of the SSIDs that my laptop and phone could see - and
never the passengers' network.

Re: Accessing web sites that use a TCP port other than 80

<kd0s01F16q9U1@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5157&group=uk.telecom.broadband#5157

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@andyburns.uk (Andy Burns)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Mon, 22 May 2023 10:46:43 +0100
Lines: 8
Message-ID: <kd0s01F16q9U1@mid.individual.net>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Ae9TDZplNY4pPrmD1KrvaQKZ/0l4ylxVAzI4S67bNeO6UwdQvu
Cancel-Lock: sha1:OaPqf8yrkBp7pmQBrevjHb1RjwE=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Content-Language: en-GB
In-Reply-To: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
 by: Andy Burns - Mon, 22 May 2023 09:46 UTC

NY wrote:

> Is there anything I could have done differently in my laptop network
> configuration such that I could access web sites that didn't use port
> 80, when their port numbers were (apparently) blocked by the ship's wifi?

Setup your own "road warrior" openVPN at home listening on port TCP/443
and UDP/53 (assuming you don't run a web or DNS server)

Re: Accessing web sites that use a TCP port other than 80

<Q+A*yWTgz@news.chiark.greenend.org.uk>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5159&group=uk.telecom.broadband#5159

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: theom+news@chiark.greenend.org.uk (Theo)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: 22 May 2023 14:38:42 +0100 (BST)
Organization: University of Cambridge, England
Message-ID: <Q+A*yWTgz@news.chiark.greenend.org.uk>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <kd0s01F16q9U1@mid.individual.net>
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:212.13.197.229";
logging-data="8099"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: tin/1.8.3-20070201 ("Scotasay") (UNIX) (Linux/5.10.0-22-amd64 (x86_64))
Originator: theom@chiark.greenend.org.uk ([212.13.197.229])
 by: Theo - Mon, 22 May 2023 13:38 UTC

Andy Burns <usenet@andyburns.uk> wrote:
> NY wrote:
>
> > Is there anything I could have done differently in my laptop network
> > configuration such that I could access web sites that didn't use port
> > 80, when their port numbers were (apparently) blocked by the ship's wifi?
>
> Setup your own "road warrior" openVPN at home listening on port TCP/443
> and UDP/53 (assuming you don't run a web or DNS server)

Or forward port 443 to a machine that has SSH and then use it as a SOCKS
proxy, where your traffic will emerge from the SSH server:

https://ma.ttias.be/socks-proxy-linux-ssh-bypass-content-filters/

It's not quite as easy to use as OpenVPN (you need to configure each app
that connects separately) but, apart from listening on port 443, there's no
prior setup of the server needed. This will work with any SSH server you
can connect to.

Theo

Re: Accessing web sites that use a TCP port other than 80

<kdahmgFg33bU1@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5190&group=uk.telecom.broadband#5190

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: void-invalid-dead-dontuse@email.invalid (Brian Gregory)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Fri, 26 May 2023 02:52:16 +0100
Lines: 12
Message-ID: <kdahmgFg33bU1@mid.individual.net>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
<u4f388$23jfm$1@dont-email.me> <u4f9f6$24bv3$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net B0UZ2dojdJIbV51ZEGNxyQsbAe8Ynha4MMxJ4MfrI0T61lHekL
Cancel-Lock: sha1:xui8etoNRqxif4rD2EaYxjuww4g=
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.11.1
Content-Language: en-GB
In-Reply-To: <u4f9f6$24bv3$1@dont-email.me>
 by: Brian Gregory - Fri, 26 May 2023 01:52 UTC

On 22/05/2023 09:34, NY wrote:
> No, it was P&O, so *nominally* British. It was fitted with UK 3-pin
> mains sockets so it's likely that the firewall would have been
> configured to UK specs.

There are no UK specs for firewalls. We're not a totalitarian
dictatorship like China. Individual business owners and users are
allowed to configure things the way they want.

--
Brian Gregory (in England).

Re: Accessing web sites that use a TCP port other than 80

<u4prbl$3u75s$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5191&group=uk.telecom.broadband#5191

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: me@privacy.invalid (NY)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Fri, 26 May 2023 09:41:31 +0100
Organization: A noiseless patient Spider
Lines: 1
Message-ID: <u4prbl$3u75s$1@dont-email.me>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u4f9f6$24bv3$1@dont-email.me> <kdahmgFg33bU1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain;
format=flowed;
charset="utf-8";
reply-type=response
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 26 May 2023 08:41:25 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="3b5bdda00bec3265dd3fc23e4268f7e8";
logging-data="4136124"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+UOQmdSP/MhhmCxLSVn04XVTeF+qgBp9Q="
Cancel-Lock: sha1:2NFPdSmJTZoHzcPfE4XH+Fm+KkA=
X-Antivirus-Status: Clean
In-Reply-To: <kdahmgFg33bU1@mid.individual.net>
X-MSMail-Priority: Normal
X-Priority: 3
X-Newsreader: Microsoft Windows Live Mail 14.0.8089.726
X-Antivirus: Avast (VPS 230526-0, 26/5/2023), Outbound message
X-MimeOLE: Produced By Microsoft MimeOLE V14.0.8089.726
Importance: Normal
 by: NY - Fri, 26 May 2023 08:41 UTC

"Brian Gregory" <void-invalid-dead-dontuse@email.invalid> wrote in message
news:kdahmgFg33bU1@mid.individual.net...
> On 22/05/2023 09:34, NY wrote:
>> No, it was P&O, so *nominally* British. It was fitted with UK 3-pin mains
>> sockets so it's likely that the firewall would have been configured to UK
>> specs.
>
> There are no UK specs for firewalls. We're not a totalitarian dictatorship
> like China. Individual business owners and users are allowed to configure
> things the way they want.

True, but any departure from "everything is permitted" needs to be justified
to the satisfaction of the end-user: "Why (*) are not you allowing this port
to be open? Convince me that it is necessary".

(*) And anyone who uses lazy, woolly, imprecise phrases such as "for
security reasons" will die a slow and painful death ;-). Be precise and
specific.

Re: Accessing web sites that use a TCP port other than 80

<kdbe9vFk8jvU1@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5192&group=uk.telecom.broadband#5192

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!feeder1.feed.usenet.farm!feed.usenet.farm!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!news-out.netnews.com!news.alt.net!fdc2.netnews.com!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: nin@moss-eccardt.com (Rupert Moss-Eccardt)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Fri, 26 May 2023 11:00:30 +0100
Lines: 25
Message-ID: <kdbe9vFk8jvU1@mid.individual.net>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u4f9f6$24bv3$1@dont-email.me> <kdahmgFg33bU1@mid.individual.net> <u4prbl$3u75s$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8Bit
X-Trace: individual.net GlMk+vHkn6zKWIDOZmXbCww63facGxpm2dRofI9RBTUDctz3cP
Cancel-Lock: sha1:gTybubqVEI6qKzdketfVJQtsPfc=
User-Agent: NewsgroupsRT/17
In-Reply-To: <u4prbl$3u75s$1@dont-email.me>
X-Received-Bytes: 1942
 by: Rupert Moss-Eccardt - Fri, 26 May 2023 10:00 UTC

On 26 May 2023 09:41, "NY" wrote:
> "Brian Gregory" <void-invalid-dead-dontuse@email.invalid> wrote in message
> news:kdahmgFg33bU1@mid.individual.net...
>> On 22/05/2023 09:34, NY wrote:
>>> No, it was P&O, so *nominally* British. It was fitted with UK 3-pin mains
>>> sockets so it's likely that the firewall would have been configured to UK
>>> specs.
>>
>> There are no UK specs for firewalls. We're not a totalitarian dictatorship
>> like China. Individual business owners and users are allowed to configure
>> things the way they want.
>
> True, but any departure from "everything is permitted" needs to be justified
> to the satisfaction of the end-user: "Why (*) are not you allowing this port
> to be open? Convince me that it is necessary".
>
>
> (*) And anyone who uses lazy, woolly, imprecise phrases such as "for
> security reasons" will die a slow and painful death ;-). Be precise and
> specific.

Firewalls should start "all blocked" and then holes made where
necessary.

Re: Accessing web sites that use a TCP port other than 80

<u5028s$v28e$2@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5197&group=uk.telecom.broadband#5197

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: DarthPiriteze@deathstar.gal (Jason H)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Sun, 28 May 2023 18:16:12 +0100
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <u5028s$v28e$2@dont-email.me>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk>
<u4f388$23jfm$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 28 May 2023 17:16:12 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="ec3be613370a23e122784dcc7b5f5043";
logging-data="1018126"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18nyyfrBbec4+9eMKGEcvw3fd18boRR39A="
User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Cancel-Lock: sha1:nUMN8dzhwFXNaogHuNMlPp2tQYs=
Content-Language: en-US
In-Reply-To: <u4f388$23jfm$1@dont-email.me>
 by: Jason H - Sun, 28 May 2023 17:16 UTC

>> Is there anything I could have done differently in my laptop network
>> configuration such that I could access web sites that didn't use port
>> 80, when their port numbers were (apparently) blocked by the ship's wifi?
>
> That is an issue when travelling anywhere. Go to France and you will
> find free wi-fi around Tourist Information offices and the local Mairie
> (Mayor's) office BUT whilst the former is usually open access the latter
> more often than not is supplied by Orange France and they block
> everything bar port 80. If you use a mail client, forget it, the only
> option is webmail.
>
> Was the ship of French parentage by any chance?

Using a VPN should get you around that sort of problem.

Re: Accessing web sites that use a TCP port other than 80

<u54mnm$1vk8u$1@dont-email.me>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5200&group=uk.telecom.broadband#5200

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: me@privacy.invalid (NY)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Tue, 30 May 2023 12:29:16 +0100
Organization: A noiseless patient Spider
Lines: 1
Message-ID: <u54mnm$1vk8u$1@dont-email.me>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain;
format=flowed;
charset="utf-8";
reply-type=response
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 30 May 2023 11:29:58 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="7839e143755b017e8211778ed7558915";
logging-data="2085150"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19ETw029VAdLO8MHmgq9iQpzo7D9FaXn0Q="
Cancel-Lock: sha1:nlon3jTZ31uDpF+SuaslvapuT/w=
X-Antivirus-Status: Clean
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V14.0.8089.726
In-Reply-To: <u5028s$v28e$2@dont-email.me>
X-MSMail-Priority: Normal
X-Priority: 3
X-Antivirus: Avast (VPS 230530-0, 30/5/2023), Outbound message
X-Newsreader: Microsoft Windows Live Mail 14.0.8089.726
 by: NY - Tue, 30 May 2023 11:29 UTC

"Jason H" <DarthPiriteze@deathstar.gal> wrote in message
news:u5028s$v28e$2@dont-email.me...
>
>>> Is there anything I could have done differently in my laptop network
>>> configuration such that I could access web sites that didn't use port
>>> 80, when their port numbers were (apparently) blocked by the ship's
>>> wifi?
>>
>> That is an issue when travelling anywhere. Go to France and you will find
>> free wi-fi around Tourist Information offices and the local Mairie
>> (Mayor's) office BUT whilst the former is usually open access the latter
>> more often than not is supplied by Orange France and they block
>> everything bar port 80. If you use a mail client, forget it, the only
>> option is webmail.
>>
>> Was the ship of French parentage by any chance?
>
> Using a VPN should get you around that sort of problem.

Is it possible for a firewall to block traffic to/from a VPN while allowing
through direct traffic to a port-80 website? I wouldn't put it past P&O to
block VPN traffic. I imagine one reason for a tightly-locked firewall is
that they don't want people streaming high-bandwidth data such as films. I
noticed that although the Youtube website would open, it wasn't possible to
play a Youtube video that was displayed as a thumbnail. Not that I wanted
to, but I was experimenting in an idle moment to see what I was and wasn't
allowed to do. ;-)

The inability to access a non-port-80 website (my Raspberry Pi PVR at home
via port-forwarding on my router) was frustrating. I decided to record the
Coronation in HD rather than the SD recording I'd set before we left home.
Blocked :-( But a bit of lateral thinking worked: connect to the Pi by Real
VPN (thank goodness that worked) and then open up a browser on the Pi which
accessed the PVR software on the Pi's port 9981. Easy peasy, once I'd worked
out a workaround. I could have waited a day or so until we were in port and
I could access the internet by mobile phone rather than by ship's firewalled
wifi.

Re: Accessing web sites that use a TCP port other than 80

<8Yq*l9yhz@news.chiark.greenend.org.uk>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5201&group=uk.telecom.broadband#5201

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!2.eu.feeder.erje.net!feeder.erje.net!feeds.news.ox.ac.uk!news.ox.ac.uk!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: theom+news@chiark.greenend.org.uk (Theo)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: 30 May 2023 19:15:08 +0100 (BST)
Organization: University of Cambridge, England
Message-ID: <8Yq*l9yhz@news.chiark.greenend.org.uk>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me>
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:212.13.197.229";
logging-data="656"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: tin/1.8.3-20070201 ("Scotasay") (UNIX) (Linux/5.10.0-22-amd64 (x86_64))
Originator: theom@chiark.greenend.org.uk ([212.13.197.229])
 by: Theo - Tue, 30 May 2023 18:15 UTC

NY <me@privacy.invalid> wrote:
> Is it possible for a firewall to block traffic to/from a VPN while allowing
> through direct traffic to a port-80 website?

It depends on the type of VPN and which protocols it uses, but yes it's
common to block anything that doesn't go to a handful of TCP ports - 80
(http), 443 (https), 143 (imap), etc.

That's why a counter-move is to run your VPN server on TCP port 443, where
it looks a lot like https unless somebody is doing deep packet inspection.
That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).

Theo

Re: Accessing web sites that use a TCP port other than 80

<kdqv9aF1ulvU1@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5202&group=uk.telecom.broadband#5202

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!news.neodome.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: nin@moss-eccardt.com (Rupert Moss-Eccardt)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Thu, 01 Jun 2023 08:22:16 +0100
Lines: 18
Message-ID: <kdqv9aF1ulvU1@mid.individual.net>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8Bit
X-Trace: individual.net +6F1n88V18nGmcwsE92C8Qqm35eQJ5V8sIk5/zZWQpcNAnr5eR
Cancel-Lock: sha1:ZHl3Urr+gJ54m2Y835MI7BE0fHM=
User-Agent: NewsgroupsRT/17
In-Reply-To: <8Yq*l9yhz@news.chiark.greenend.org.uk>
 by: Rupert Moss-Eccardt - Thu, 1 Jun 2023 07:22 UTC

On 30 May 2023 19:15:08 +0100 (BST), Theo wrote:
> NY <me@privacy.invalid> wrote:
>> Is it possible for a firewall to block traffic to/from a VPN while allowing
>> through direct traffic to a port-80 website?
>
> It depends on the type of VPN and which protocols it uses, but yes it's
> common to block anything that doesn't go to a handful of TCP ports - 80
> (http), 443 (https), 143 (imap), etc.
>
> That's why a counter-move is to run your VPN server on TCP port 443, where
> it looks a lot like https unless somebody is doing deep packet inspection.
> That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
> Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).

A modern firewall can do more than check the port. It can check the
traffic, too. In which case using Port 80 for something that isn't HTTP
might still get blocked. It doesn't have to be DPI.

Re: Accessing web sites that use a TCP port other than 80

<+Yq*X7Hhz@news.chiark.greenend.org.uk>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5203&group=uk.telecom.broadband#5203

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!news.nntp4.net!nntp.terraraq.uk!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: theom+news@chiark.greenend.org.uk (Theo)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: 01 Jun 2023 12:06:46 +0100 (BST)
Organization: University of Cambridge, England
Message-ID: <+Yq*X7Hhz@news.chiark.greenend.org.uk>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk> <kdqv9aF1ulvU1@mid.individual.net>
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:212.13.197.229";
logging-data="9137"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: tin/1.8.3-20070201 ("Scotasay") (UNIX) (Linux/5.10.0-22-amd64 (x86_64))
Originator: theom@chiark.greenend.org.uk ([212.13.197.229])
 by: Theo - Thu, 1 Jun 2023 11:06 UTC

Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> A modern firewall can do more than check the port. It can check the
> traffic, too. In which case using Port 80 for something that isn't HTTP
> might still get blocked. It doesn't have to be DPI.

I thought that was harder for 443, because HTTPS is mostly encrypted TLS.?
If you do DPI you can tell something about the encryption (eg whether SNI is
used in the TLS request), but if you are doing basic firewalling it just
looks like TLS. So if you choose to run a different protocol over TLS
(such as OpenVPN) the firewall can't tell.

Obviously running non-HTTP traffic over port 80 can be spotted a mile off,
but I thought with 443 it was more difficult?

Theo

Re: Accessing web sites that use a TCP port other than 80

<4gbmkj-j3e3.ln1@esprimo.zbmc.eu>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5204&group=uk.telecom.broadband#5204

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.szaf.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: cl@isbd.net (Chris Green)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Thu, 1 Jun 2023 12:20:04 +0100
Lines: 29
Message-ID: <4gbmkj-j3e3.ln1@esprimo.zbmc.eu>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk> <kdqv9aF1ulvU1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net T1wkovAnBmGQHjHsst+gxAlPaoR8PclgFXN5qGs5QwvhIq2XE=
X-Orig-Path: not-for-mail
Cancel-Lock: sha1:rz9IsudcK4DbplHJjll2cMRkXXo=
User-Agent: tin/2.6.2-20220130 ("Convalmore") (Linux/5.15.0-72-generic (x86_64))
 by: Chris Green - Thu, 1 Jun 2023 11:20 UTC

Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> On 30 May 2023 19:15:08 +0100 (BST), Theo wrote:
> > NY <me@privacy.invalid> wrote:
> >> Is it possible for a firewall to block traffic to/from a VPN while allowing
> >> through direct traffic to a port-80 website?
> >
> > It depends on the type of VPN and which protocols it uses, but yes it's
> > common to block anything that doesn't go to a handful of TCP ports - 80
> > (http), 443 (https), 143 (imap), etc.
> >
> > That's why a counter-move is to run your VPN server on TCP port 443, where
> > it looks a lot like https unless somebody is doing deep packet inspection.
> > That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
> > Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).
>
> A modern firewall can do more than check the port. It can check the
> traffic, too. In which case using Port 80 for something that isn't HTTP
> might still get blocked. It doesn't have to be DPI.
>
So would it block *anything* that was encrypted? Surely encrypted
data can't be subject to analysis so how can a "modern firewall" (or
anything else for that matter) check the traffic? I suppose it could
block anything encrypted on port 80 on the basis that it should be
HTTP and thus not encrypted but I really don't see any way to block
port 443 (for example) using traffic analysis.

--
Chris Green
·

Re: Accessing web sites that use a TCP port other than 80

<kdumn5FjfpsU1@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5207&group=uk.telecom.broadband#5207

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!news.samoylyk.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: nin@moss-eccardt.com (Rupert Moss-Eccardt)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Fri, 02 Jun 2023 18:20:36 +0100
Lines: 32
Message-ID: <kdumn5FjfpsU1@mid.individual.net>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk> <kdqv9aF1ulvU1@mid.individual.net> <4gbmkj-j3e3.ln1@esprimo.zbmc.eu>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8Bit
X-Trace: individual.net Z6XRJnVG6QMvdHndgjM9twH9/9Efq9J8izf57xgbCE5thpx7Ug
Cancel-Lock: sha1:/njfBsGdwdP1ClfHVnANA9YAR98=
User-Agent: NewsgroupsRT/17
In-Reply-To: <4gbmkj-j3e3.ln1@esprimo.zbmc.eu>
 by: Rupert Moss-Eccardt - Fri, 2 Jun 2023 17:20 UTC

On 1 Jun 2023 12:20, Chris Green wrote:
> Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
>> On 30 May 2023 19:15:08 +0100 (BST), Theo wrote:
>> > NY <me@privacy.invalid> wrote:
>> >> Is it possible for a firewall to block traffic to/from a VPN while allowing
>> >> through direct traffic to a port-80 website?
>> >
>> > It depends on the type of VPN and which protocols it uses, but yes it's
>> > common to block anything that doesn't go to a handful of TCP ports - 80
>> > (http), 443 (https), 143 (imap), etc.
>> >
>> > That's why a counter-move is to run your VPN server on TCP port 443, where
>> > it looks a lot like https unless somebody is doing deep packet inspection.
>> > That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
>> > Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).
>>
>> A modern firewall can do more than check the port. It can check the
>> traffic, too. In which case using Port 80 for something that isn't HTTP
>> might still get blocked. It doesn't have to be DPI.
>>
> So would it block *anything* that was encrypted? Surely encrypted
> data can't be subject to analysis so how can a "modern firewall" (or
> anything else for that matter) check the traffic? I suppose it could
> block anything encrypted on port 80 on the basis that it should be
> HTTP and thus not encrypted but I really don't see any way to block
> port 443 (for example) using traffic analysis.

Traffic analysis (sigint) has developed rather well. So, for example,
you can describe a flow as being for OneDrive and, without decrypting,
you can develop a degree of confidence that it is, in general, being
used just for that. In Palo Alto speak it is called APPID.

Re: Accessing web sites that use a TCP port other than 80

<jpqpkj-v2sa.ln1@esprimo.zbmc.eu>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5208&group=uk.telecom.broadband#5208

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!2.eu.feeder.erje.net!feeder.erje.net!news-2.dfn.de!news.dfn.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: cl@isbd.net (Chris Green)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Fri, 2 Jun 2023 19:59:31 +0100
Lines: 47
Message-ID: <jpqpkj-v2sa.ln1@esprimo.zbmc.eu>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk> <kdqv9aF1ulvU1@mid.individual.net> <4gbmkj-j3e3.ln1@esprimo.zbmc.eu> <kdumn5FjfpsU1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net zhFoPyZFm3j4BXI6Be6QaQG+/Yx/U8EfuTD3s5DrlnK9xUMFQ=
X-Orig-Path: not-for-mail
Cancel-Lock: sha1:JM9nza5/VDXzgzSNUWWGmYtE4as=
User-Agent: tin/2.6.2-20220130 ("Convalmore") (Linux/5.15.0-72-generic (x86_64))
 by: Chris Green - Fri, 2 Jun 2023 18:59 UTC

Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> On 1 Jun 2023 12:20, Chris Green wrote:
> > Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> >> On 30 May 2023 19:15:08 +0100 (BST), Theo wrote:
> >> > NY <me@privacy.invalid> wrote:
> >> >> Is it possible for a firewall to block traffic to/from a VPN while allowing
> >> >> through direct traffic to a port-80 website?
> >> >
> >> > It depends on the type of VPN and which protocols it uses, but yes it's
> >> > common to block anything that doesn't go to a handful of TCP ports - 80
> >> > (http), 443 (https), 143 (imap), etc.
> >> >
> >> > That's why a counter-move is to run your VPN server on TCP port 443, where
> >> > it looks a lot like https unless somebody is doing deep packet inspection.
> >> > That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
> >> > Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).
> >>
> >> A modern firewall can do more than check the port. It can check the
> >> traffic, too. In which case using Port 80 for something that isn't HTTP
> >> might still get blocked. It doesn't have to be DPI.
> >>
> > So would it block *anything* that was encrypted? Surely encrypted
> > data can't be subject to analysis so how can a "modern firewall" (or
> > anything else for that matter) check the traffic? I suppose it could
> > block anything encrypted on port 80 on the basis that it should be
> > HTTP and thus not encrypted but I really don't see any way to block
> > port 443 (for example) using traffic analysis.
>
> Traffic analysis (sigint) has developed rather well. So, for example,
> you can describe a flow as being for OneDrive and, without decrypting,
> you can develop a degree of confidence that it is, in general, being
> used just for that. In Palo Alto speak it is called APPID.
>
Silly game! :-)

Surely the encrypters will soon start chopping up the data into
different sized bits such that they won't look like something they are
(or not).

There's not much you can do by analysing an encrypted data stream
except look at the chunks it's in. Anything else would depend on how
it has been encrypted and although you might try and guess at that
it's no more than a guess.

--
Chris Green
·

Re: Accessing web sites that use a TCP port other than 80

<ke0d40FraokU1@mid.individual.net>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5209&group=uk.telecom.broadband#5209

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: nin@moss-eccardt.com (Rupert Moss-Eccardt)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Sat, 03 Jun 2023 09:49:03 +0100
Lines: 54
Message-ID: <ke0d40FraokU1@mid.individual.net>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk> <kdqv9aF1ulvU1@mid.individual.net> <4gbmkj-j3e3.ln1@esprimo.zbmc.eu> <kdumn5FjfpsU1@mid.individual.net> <jpqpkj-v2sa.ln1@esprimo.zbmc.eu>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8Bit
X-Trace: individual.net aw6JxNs7zLYx2b20sebISQ7fdbJzsdsmsIVklloor78nlFRtxw
Cancel-Lock: sha1:lav9hglaKvLS6b7k1vM1wV9zf4w=
User-Agent: NewsgroupsRT/17
In-Reply-To: <jpqpkj-v2sa.ln1@esprimo.zbmc.eu>
 by: Rupert Moss-Eccardt - Sat, 3 Jun 2023 08:49 UTC

On 2 Jun 2023 19:59, Chris Green wrote:
> Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
>> On 1 Jun 2023 12:20, Chris Green wrote:
>> > Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
>> >> On 30 May 2023 19:15:08 +0100 (BST), Theo wrote:
>> >> > NY <me@privacy.invalid> wrote:
>> >> >> Is it possible for a firewall to block traffic to/from a VPN while allowing
>> >> >> through direct traffic to a port-80 website?
>> >> >
>> >> > It depends on the type of VPN and which protocols it uses, but yes it's
>> >> > common to block anything that doesn't go to a handful of TCP ports - 80
>> >> > (http), 443 (https), 143 (imap), etc.
>> >> >
>> >> > That's why a counter-move is to run your VPN server on TCP port 443, where
>> >> > it looks a lot like https unless somebody is doing deep packet inspection.
>> >> > That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
>> >> > Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).
>> >>
>> >> A modern firewall can do more than check the port. It can check the
>> >> traffic, too. In which case using Port 80 for something that isn't HTTP
>> >> might still get blocked. It doesn't have to be DPI.
>> >>
>> > So would it block *anything* that was encrypted? Surely encrypted
>> > data can't be subject to analysis so how can a "modern firewall" (or
>> > anything else for that matter) check the traffic? I suppose it could
>> > block anything encrypted on port 80 on the basis that it should be
>> > HTTP and thus not encrypted but I really don't see any way to block
>> > port 443 (for example) using traffic analysis.
>>
>> Traffic analysis (sigint) has developed rather well. So, for example,
>> you can describe a flow as being for OneDrive and, without decrypting,
>> you can develop a degree of confidence that it is, in general, being
>> used just for that. In Palo Alto speak it is called APPID.
>>
> Silly game! :-)
>
> Surely the encrypters will soon start chopping up the data into
> different sized bits such that they won't look like something they are
> (or not).
>
> There's not much you can do by analysing an encrypted data stream
> except look at the chunks it's in. Anything else would depend on how
> it has been encrypted and although you might try and guess at that
> it's no more than a guess.

Most encryption passing gateways is application-level (e.g. M365) which
is entirely amenable to this approach. There is more fingerprinting
available than you might think. Worth looking at some white papers.

Yes, VPNs of the sort being talked about here are different but then,
back to the original post, I imagine the CSP (the ship operators in
this case) probably want to stop VPNs to enable them to manage their
costs and obligations well

Re: Accessing web sites that use a TCP port other than 80

<9kdrkj-tb1e.ln1@esprimo.zbmc.eu>

  copy mid

https://news.novabbs.org/aus+uk/article-flat.php?id=5210&group=uk.telecom.broadband#5210

  copy link   Newsgroups: uk.telecom.broadband
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: cl@isbd.net (Chris Green)
Newsgroups: uk.telecom.broadband
Subject: Re: Accessing web sites that use a TCP port other than 80
Date: Sat, 3 Jun 2023 10:27:05 +0100
Lines: 61
Message-ID: <9kdrkj-tb1e.ln1@esprimo.zbmc.eu>
References: <U-2cnStUi5EXL_f5nZ2dnZfqn_qdnZ2d@brightview.co.uk> <u4f388$23jfm$1@dont-email.me> <u5028s$v28e$2@dont-email.me> <u54mnm$1vk8u$1@dont-email.me> <8Yq*l9yhz@news.chiark.greenend.org.uk> <kdqv9aF1ulvU1@mid.individual.net> <4gbmkj-j3e3.ln1@esprimo.zbmc.eu> <kdumn5FjfpsU1@mid.individual.net> <jpqpkj-v2sa.ln1@esprimo.zbmc.eu> <ke0d40FraokU1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net qpI7Vu+089vrS0Vw5Pvv4AlbsNvKffCNKk1iaWDhPmMKVY+bY=
X-Orig-Path: not-for-mail
Cancel-Lock: sha1:ExVLSIafJP+6SbDn1qTKPIT3Ri8=
User-Agent: tin/2.6.2-20220130 ("Convalmore") (Linux/5.15.0-72-generic (x86_64))
 by: Chris Green - Sat, 3 Jun 2023 09:27 UTC

Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> On 2 Jun 2023 19:59, Chris Green wrote:
> > Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> >> On 1 Jun 2023 12:20, Chris Green wrote:
> >> > Rupert Moss-Eccardt <nin@moss-eccardt.com> wrote:
> >> >> On 30 May 2023 19:15:08 +0100 (BST), Theo wrote:
> >> >> > NY <me@privacy.invalid> wrote:
> >> >> >> Is it possible for a firewall to block traffic to/from a VPN while allowing
> >> >> >> through direct traffic to a port-80 website?
> >> >> >
> >> >> > It depends on the type of VPN and which protocols it uses, but yes it's
> >> >> > common to block anything that doesn't go to a handful of TCP ports - 80
> >> >> > (http), 443 (https), 143 (imap), etc.
> >> >> >
> >> >> > That's why a counter-move is to run your VPN server on TCP port 443, where
> >> >> > it looks a lot like https unless somebody is doing deep packet inspection.
> >> >> > That only works with VPN protocols that are happy to use TCP - eg OpenVPN.
> >> >> > Other VPNs use UDP or GRE (a separate protocol over IP than TCP or UDP).
> >> >>
> >> >> A modern firewall can do more than check the port. It can check the
> >> >> traffic, too. In which case using Port 80 for something that isn't HTTP
> >> >> might still get blocked. It doesn't have to be DPI.
> >> >>
> >> > So would it block *anything* that was encrypted? Surely encrypted
> >> > data can't be subject to analysis so how can a "modern firewall" (or
> >> > anything else for that matter) check the traffic? I suppose it could
> >> > block anything encrypted on port 80 on the basis that it should be
> >> > HTTP and thus not encrypted but I really don't see any way to block
> >> > port 443 (for example) using traffic analysis.
> >>
> >> Traffic analysis (sigint) has developed rather well. So, for example,
> >> you can describe a flow as being for OneDrive and, without decrypting,
> >> you can develop a degree of confidence that it is, in general, being
> >> used just for that. In Palo Alto speak it is called APPID.
> >>
> > Silly game! :-)
> >
> > Surely the encrypters will soon start chopping up the data into
> > different sized bits such that they won't look like something they are
> > (or not).
> >
> > There's not much you can do by analysing an encrypted data stream
> > except look at the chunks it's in. Anything else would depend on how
> > it has been encrypted and although you might try and guess at that
> > it's no more than a guess.
>
> Most encryption passing gateways is application-level (e.g. M365) which
> is entirely amenable to this approach. There is more fingerprinting
> available than you might think. Worth looking at some white papers.
>
> Yes, VPNs of the sort being talked about here are different but then,
> back to the original post, I imagine the CSP (the ship operators in
> this case) probably want to stop VPNs to enable them to manage their
> costs and obligations well
>
My approach is usually to use an end-to-end ssh tunnel which I think
is probably as difficult to analyse as a VPN.

--
Chris Green
·

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor