Hello there,
I have used to block some webpages, but now users have found a way how to pass the firewall with "TOR browser"..
Can someone help me to block it?
Then Update the list frequently because it changes.Find a list of known TOR edge IP addresses, then create an IP address list with those addresses.
Then make rule #1 in the forward chain = drop packets dst-address-list=TOR_ROUTERS
Then Update the list frequently because it changes.Find a list of known TOR edge IP addresses, then create an IP address list with those addresses.
Then make rule #1 in the forward chain = drop packets dst-address-list=TOR_ROUTERS
Yes, that article has some useful information, and is exactly the solution you want, except that the address list must be very out of date indeed - the author states that they are using ROS version 3.xBro, how to find EDGE ip'addresses? and.. i used to read a post in mikrotik and i followed their steps
http://wiki.mikrotik.com/wiki/How_to_De ... er_traffic
but no effect, seems they are old ips or ?
Thanks
Hello there,
I have used to block some webpages, but now users have found a way how to pass the firewall with "TOR browser"..
Can someone help me to block it?
Your posted site actually contains a link to IP only listYes, that article has some useful information, and is exactly the solution you want, except that the address list must be very out of date indeed - the author states that they are using ROS version 3.x
Here's a site that claims to have a constantly-updated list of tor nodes.
https://www.dan.me.uk/tornodes
You'll have to parse that somehow - the easiest way to do it pseudo-manually is to copy/paste into excell, using | character as field delimiter, and then having a collumn which = concatenate("add list=tornodes address=",a1) and then copy/paste the values into terminal window after typing /ip firewall address[enter]
Yuck - if you know anything about scripting, (I don't think Mikrotik scripting is going to be useful for this) with php, perl, etc, you could probably automate this a little more.
Append that with something like this - http://wiki.mikrotik.com/wiki/Using_Fet ... ress_Lists (not sure if working on current versions). Add to scheduler and you are done!You can also fetch https://www.dan.me.uk/torlist/ for a list of ips only, one per line - updated every 30 minutes. Ideal for constructing your own tor banlists.
It's only evil if you use it to hide criminal activities....@Zerobyte
Did you remember about evil software?? TOR is one of them.
Yes me don't wanted to change the topic but just noting that:It's only evil if you use it to hide criminal activities....@Zerobyte
Did you remember about evil software?? TOR is one of them.
Keeping the boss's middlebox from snooping on web browsing habits - or keeping the NSA out of your web browsing, that's the kind of use for me - not to go get access to illegal things on the "deep web"
(unrelated- I had my router's IPv6 firewall connections screen open, and just saw a udp packet sent to google on port 443.
Weird)
If you wanna have script to add TOR's IP's you should see "emils" Post in above.
about other VPN and software like free gate.... I'm not sure you'll be able to make it...
then you're fighting a losing battle.
Probably the most reliable way is to intercept DNS, use a server that has policies, and won't give the IP address of domains that you want. DNS is unencrypted, so you could still do packet inspection to match (and drop) DNS on unstandard ports. You can map all dns to your "policy-based" server, or ONLY allow dns to that server....then you're fighting a losing battle.
I think no one cares as me in this situation. I tried to block them. no luck. sometimes it's good to block it in internet cafe but because of loosing customers ( ) I didn't go further. I think you can block them in your domain via some group policy or your computers firewall. but it's really easy to bypass that.
yup, I heard of it. but didn't try it. But e.g If i block facebook this way I think users can open it via it's IP of website, ha?Probably the most reliable way is to intercept DNS, use a server that has policies, and won't give the IP address of domains that you want. DNS is unencrypted, so you could still do packet inspection to match (and drop) DNS on unstandard ports. You can map all dns to your "policy-based" server, or ONLY allow dns to that server....then you're fighting a losing battle.
I think no one cares as me in this situation. I tried to block them. no luck. sometimes it's good to block it in internet cafe but because of loosing customers ( ) I didn't go further. I think you can block them in your domain via some group policy or your computers firewall. but it's really easy to bypass that.
I just put https://173.252.88.66/ into my browser. It gave me a certificate warning, and then forced me to the host by name anyway, so I'm betting facebook won't work if you took away the DNS.... Turn off DNS in your computer and type in that IP address and see if it works... (now I'm curious)yup, I heard of it. but didn't try it. But e.g If i block facebook this way I think users can open it via it's IP of website, ha?
There's no config - just turn off DNS in your computer and surf to that IP - that's facebook's IP.Can you give me the config so i can test it?
(I've got plenty of IPs and sample config but it's not available)
Your posted site actually contains a link to IP only listYes, that article has some useful information, and is exactly the solution you want, except that the address list must be very out of date indeed - the author states that they are using ROS version 3.x
Here's a site that claims to have a constantly-updated list of tor nodes.
https://www.dan.me.uk/tornodes
You'll have to parse that somehow - the easiest way to do it pseudo-manually is to copy/paste into excell, using | character as field delimiter, and then having a collumn which = concatenate("add list=tornodes address=",a1) and then copy/paste the values into terminal window after typing /ip firewall address[enter]
Yuck - if you know anything about scripting, (I don't think Mikrotik scripting is going to be useful for this) with php, perl, etc, you could probably automate this a little more.Append that with something like this - http://wiki.mikrotik.com/wiki/Using_Fet ... ress_Lists (not sure if working on current versions). Add to scheduler and you are done!You can also fetch https://www.dan.me.uk/torlist/ for a list of ips only, one per line - updated every 30 minutes. Ideal for constructing your own tor banlists.