Hello @RS_Daniel ,
Thank you for the screenshots, so, what I understand from the rules and everything showed, is that:
- when the firewall identifies the Psiphon application, based on the signatures it has defined, it's blocking it - clearly visible in what you showed us.
- when the firewall is not identifying the Psiphon applications, it's signatures, then traffic is allowed (the first screenshots you showed us).
Your customer, should understand that in order for an appliance (firewall or other one), to be able to identify some traffic is coming from some specific application, it should match some signatures as they were defined. In this particular case, maybe Checkpoint can clarify a bit on what they ar looking in Psiphon case. In general those signatures are composed from several little pieces, like url components, client type, specific port, etc. bun in the case of psiphon, there are couple multiple random things, therefore it's not always getting appropriate detection.
Also if you look closely, the traffic was properly identified while happening on HTTPS (443 port) but when it was on port 80, it was not, and I can bet my liver, it was because the HTTPS Inspection blade does not look into other ports outside 443.
Just for the sake of tests, I would give it a try and enable HTTPS on port 80, all the previous traffic from psiphone , that we've seen it allowed, it will be blocked - most definitely.
You need to read this post, and define/clone an HTTPS_80 from HTTPS, and user that new one in the HTTPS Inspection rules in an Inspection rule specific for that internal machine you're testing from (192.168.100.37) and repeat the tests.
What that will do, it will involve the HTTPS Inspection blade for traffic happening over port 80, and that will open-up the clear data to all the other blades, so mist likely - I really hope - it will mark earlier traffic happening over port 80 as Psiphon.
Otherwise, if the other connections, are encrypted, then the traffic is invisible for some of the blades, therefore it can;t match exactly what's what. And that is a normal behavior (please tell me if I'm wrong).
What I'm curious, the first 2 screenshots, what rule was allowing them? is that rule higher or lower than rule 14 ?
Thank you,
PS: if you are doing tcpdump on the line coming from that client (192.168.100.37) can you see that all traffic is encrypted? that would confirm my dumb logic above.
PS2: @PhoneBoy , can you or someone else from Checkpoint, confirm or infirm my above understanding 😊, ty.