Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

Options

Chromium-based browsers (Edge, Chrome, etc) on Canary channel (v125) bypass content filtering/DPI

I've discovered Chromium browsers based on v125 and newer are able to bypass SonicWall's content filtering. I've tested this with SonicOS version 6.5 and 7.1.1.

This is an issue with Google Chrome Canary and Microsoft Edge Canary (v125), but not Dev (v124) so I believe this is a new problem specific to all Chromium browsers based on v125+.

On the firewall running 7.1.1, I also blocked QUIC using Application Control, which made no difference. To further verify this is not related to QUIC, I disabled QUIC in the browser settings, and blocked UDP on port 443.

In the case of the 6.5 firewall, DPI is disabled, but it is enabled with a certificate installed on my test machine on the 7.1.1 firewall.

HTTPS filtering is enabled on the filtering policy, and I'm not logged in as admin so that's not related either.

Filtering works correctly with Google Chrome Stabe and Beta, and Edge Stable and Beta, and the website certificates show that they are signed by SonicWall, which confirms the traffic is being decrypted. However, in Dev/Canary (v125), the certificates are the original website certs.

For my testing, I blocked the "Shopping" category, and tried browsing to Target.com. I've linked the cert info below.

Google Chrome Stable

Chromium Dev v125

Does anyone have any ideas? I've never seen this before, but it seems to be a recent development since I can only replicate it on v125.

Category: Entry Level Firewalls
Reply

Answers

  • Options
    happy_harryhappy_harry Newbie ✭

    Something I didn't notice before is that this seems to be only an issue when in Incognito Mode. Filtering seems to work correctly when not incognito.

  • Options
    CRISLCRISL Newbie ✭

    @happy_harry I have the same problem with v124 Edge stable. Contentfilter and DPISSL no longer work - regardless of whether normal or incognito

  • Options
    crimsycrimsy Newbie ✭

    I have noticed a different issue, it seems that somehow the firewall CFS service is blocking everything that we have been able to access in the past. Disabling QUIC makes no difference. It is happening on both Chrome and Edge.

    Started in Chrome Version 124.0.6367.61  and in Edge Version 124.0.2478.51

  • Options
    CRISLCRISL Newbie ✭

    I found the feature in Edge and Chrome: TLS 1.3 hybridized Kyber support But it must not happen that users can bypass DPISSL (or blocking). SonicWall must react quickly to this.

  • Options
    happy_harryhappy_harry Newbie ✭
    edited April 22

    A commenter posted this on my /r/SonicWall Reddit thread about the issue. I can confirm it also fixes it on Chrome.

    edge://flags/ ( for edge, change it from chrome to edge in the URL)Search and disable the following setting:TLS 1.3 hybridized Kyber support

    For Chrome use "chrome://flags/"

    Obviously this is a workaround, not a true fix. Hopefully SonicWall fixes this issue quickly.

  • Options
    CRISLCRISL Newbie ✭

    thanks to Frederico on Google-Help:

    to disabled TLS 1.3 hybridized Kyber support by GPO

    Updating ADMX files for Edge and Chrome:

    Computer Configuration > Policies > Administrative Templates > Google > Google Chrome > Enable post-quantum key agreement for TLS > Disabled

    Computer Configuration > Policies > Administrative Templates > Microsoft Edge> Enable post-quantum key agreement for TLS > Disabled

    Doing that, I do not have problems anymore and my Internet Filtering by CFS Sonicwall is working fine now

  • Options
    crimsycrimsy Newbie ✭
    edited April 22

    I can confirm we are using the same workaround with the GPO "Enable post-quantum key agreement for TLS" for both Edge and Chrome.

    It seems to fix it for now, but I am sure it's temporary.

  • Options
    crimsycrimsy Newbie ✭

    Well, looking forward to a firmware fix or something on this now that I see a KB :)

Sign In or Register to comment.