<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block users from using Tor in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563555#M658167</link>
    <description>&lt;P&gt;The title says it all.&lt;/P&gt;&lt;P&gt;How do I block users from using the Tor network to bypass the firewall?&lt;/P&gt;&lt;P&gt;All I'm able to find is that Tor uses port 9001 (TCP) by default but switches to any other open port (80,443,25,23,22, etc) when it's blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Blocking those 'backup' ports is obviously not the right way, so I'm looking for inspect rules or any other way to classify and block Tor.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:36:50 GMT</pubDate>
    <dc:creator>Frank Hoeben</dc:creator>
    <dc:date>2019-03-11T18:36:50Z</dc:date>
    <item>
      <title>Block users from using Tor</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563555#M658167</link>
      <description>&lt;P&gt;The title says it all.&lt;/P&gt;&lt;P&gt;How do I block users from using the Tor network to bypass the firewall?&lt;/P&gt;&lt;P&gt;All I'm able to find is that Tor uses port 9001 (TCP) by default but switches to any other open port (80,443,25,23,22, etc) when it's blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Blocking those 'backup' ports is obviously not the right way, so I'm looking for inspect rules or any other way to classify and block Tor.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563555#M658167</guid>
      <dc:creator>Frank Hoeben</dc:creator>
      <dc:date>2019-03-11T18:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Block users from using Tor</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563556#M658180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Frank,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a quick capture to look at the Tor client while it is connecting. It looks like it encrypts most of the connection traffic, so all your users would probably need to first connect through a proxy that could decrypt the connection and block it that way. Tor is designed to be very resilient, so I don't think you'll find a feasible way to block it at the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 12:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563556#M658180</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-09-08T12:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: Block users from using Tor</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563557#M658193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was afraid of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plan B would be to tell the AV software to block the Tor executables by default, but files are easily renamed and versions change so file hashes are useless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plan C is making the use of firewall bypassing software an offense punishable by death.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 13:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563557#M658193</guid>
      <dc:creator>Frank Hoeben</dc:creator>
      <dc:date>2010-09-08T13:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Block users from using Tor</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563558#M658216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One alternative could be to tie down the inside interface access-list to a&lt;/P&gt;&lt;P&gt;specific list of allowed ports. From what I understand of working of Tor, it&lt;/P&gt;&lt;P&gt;tries to relay through multiple hosts and for that, the relay servers setup&lt;/P&gt;&lt;P&gt;certain ports. So, if you limit the inside network access to normal ports&lt;/P&gt;&lt;P&gt;like 80/443, and 53, then the access will be limited to these ports. Now,&lt;/P&gt;&lt;P&gt;you can configure HTTP inspection to limit Tor access on port 80 as well&lt;/P&gt;&lt;P&gt;(you might take a performance hit when you configure http inspection). This&lt;/P&gt;&lt;P&gt;will limit the Tor users to use only port 443 for relay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 13:35:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563558#M658216</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-08T13:35:13Z</dc:date>
    </item>
    <item>
      <title>My way to block tor is</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563559#M658231</link>
      <description>&lt;P&gt;My way to block tor is this&lt;/P&gt;&lt;P&gt;http://nbctcp.wordpress.com/2014/10/20/blocking-tor-browser-in-cisco-asa-5505/&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2014 01:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563559#M658231</guid>
      <dc:creator>nawir</dc:creator>
      <dc:date>2014-10-20T01:50:55Z</dc:date>
    </item>
    <item>
      <title>do you have all IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563560#M658246</link>
      <description>&lt;P&gt;do you have all IP addresses of TOR servers?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;palo-alto firewall can block tor because it has protocol inspection&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2014 15:38:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563560#M658246</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2014-10-20T15:38:16Z</dc:date>
    </item>
    <item>
      <title>If you check my my link,</title>
      <link>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563561#M658265</link>
      <description>&lt;P&gt;If you check my my link, there are around 6500 server I need to copy paste into botnet blacklist.&lt;/P&gt;&lt;P&gt;I admit its not automatic way to block tor, but at least its work. I already test that.&lt;/P&gt;&lt;P&gt;If management have budget, of course they can buy another easier to manage device.&lt;/P&gt;&lt;P&gt;Its just one alternative to block tor&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2014 01:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-users-from-using-tor/m-p/1563561#M658265</guid>
      <dc:creator>nawir</dc:creator>
      <dc:date>2014-10-21T01:55:52Z</dc:date>
    </item>
  </channel>
</rss>

