Blocking TOR Browser
Blocking TOR Browser
Blocking TOR Browser
Traffic
Overview
This document has been prepared to provide an overview of Zscaler ZIA platform
capabilities of detecting and blocking TOR browser traffic.
Zscaler ZIA platform offers multiple mechanisms to disrupt its traffic and minimize TOR client
usage:
ACME’s Configuration
As listed earlier, ACME is currently using 2 out of 5 methods to disrupt TOR traffic going via
Zscaler ZIA platform:
Choose to Block the usage of Tor, a popular P2P anonymizer protocol. Zscaler then blocks
users from downloading TOR client. Content downloaded with Tor is encrypted, therefore it
cannot be inspected.
Procedure
To configure the Advanced Threat Protection policy:
For detailed instructions, see Configuring the Advanced Threat Protection Policy.
Blocking TOR Browser
The Zscaler service provides firewall capabilities that allow granular control over your
organization’s outbound TCP, UDP, and ICMP traffic. Firewall Control Deep Packet
Inspection (DPI) engine can enhance TOR traffic detection and disrupt the connections.
Configure Tor under Network Applications and Block it. For detailed instructions, see
Configuring the Firewall Filtering Control Policy.
Many connections established by TOR are to bogus websites. Blocking untrusted and
revoked certificates will stop it from establishing a successful SSL handshake.
1. You can block the untrusted certificates. E.g. path validation failure, unknown issuer,
certificate expired, and common name does not match.
2. Configure OCSP Revocation Check. Enable this flag to include certificate
revocation check in the untrusted server certificate validation. The service uses
OCSP (Online Certificate Status Protocol) to obtain the revocation status of a
certificate. If the OCSP check fails, the action is determined by the Untrusted Server
Certificates setting.
Blocking TOR Browser
An organization can use this fact to either caution or block this type of traffic utilizing the
Zscaler URL Filtering policies. Result of action “Block” on this TOR traffic is self-explanatory.
Caution action by design redirects the user to a “Caution” page that the user must click
through and accept the warning before being redirected to the origin URL. As this
mechanism interferes with the communication flow this method is able to break TOR
browser session.
ACME currently is allowing the Miscellaneous URL categories as part of the “Internet_basic”
rule.
Blocking TOR Browser
Enforcing the “Caution” or “Block” action can impact other, no TOR related traffic hence it is
recommended to:
• Review current and historic logs for traffic classified as Miscellaneous and Unknown
and identify business related websites/applications that should be either
recategorized or exempted from “Caution/Block” rule
• Use “Caution” action as it is less intrusive and allows users to visit valid websites
which are part of Miscellaneous or Unknown category
• Gradually enforce/test the “Caution” action by utilizing Users/Department/Location
criteria under the URL Filtering policies
Below you can find an article describing “Caution notification” in more detail:
https://help.zscaler.com/zia/configuring-caution-notification
The Zscaler service uses custom signatures built and updated by Zscaler's security research
team, as well as signatures from industry-leading vendors. Using these signatures, the
Zscaler service is able to monitor your traffic in real time. As soon as the Intrusion
Prevention System (IPS) has examined the contents of your traffic and found a pattern
match, it can enforce your policies inline.
Zscaler has built-in signature for TOR traffic and can detect it when TOR browser is utilizing
an OBFS4 obfuscation bridge-mode.
By default, IPS control policy is set to Block/Drop traffic when a threat is detected.
Blocking TOR Browser
For the configured rule to be enforced IPS control must be explicitly enabled per location
bases:
As enabling IPS Control can have a potential impact to customer traffic, Zscaler
recommends considering the following:
• Configure rule with action “Allow” which will allow packets to pass through IPS but
will still log matching signatures. This type of rule allows a deploying customer to
understand the potential impact of enabling IPS. Example below:
• When ready to transition to Block/Drop action to utilize the available criteria to limit
the enforcement of the rule and potential impact
• Enable IPS Control on selected Locations only based on company policy and
requirements
Blocking TOR Browser
https://help.zscaler.com/zia/recommended-ips-control-policy
https://help.zscaler.com/zia/recommended-ips-control-policy