TB Skype - Pdf.a
TB Skype - Pdf.a
TB Skype - Pdf.a
SGOS 4, 5 Series
Controlling Skype
Introduction to Skype
With the large deployment of broadband technologies, many Internet users are always connected to the Internet. Skype offers a free Internet telephony service. It allows subscribers to make voice calls at no cost to other Skype subscribers using the Skype client. Skype is based on P2P (Peer to Peer) technology. This technical brief shows administrators how to block Skype traffic using ProxySG.
Ordinary Host
Super Node
Internet
Skype Log-in
When users install and execute a Skype client, the client tries to figure out whether it is behind a Network Address Translation (NAT) device, such as a firewall. Because UDP (User Datagram Protocol) packets have trouble traversing NAT firewalls, UDP uses a technique called STUN (Simple Traversal of UDP through NAT) to determine what kind of NAT device it is behind.
If the NAT is a Full Cone, Restricted Cone or Port Restricted NAT, the Skype client obtains the IP address and port information that outside applications can use to send UDP packets to the client. If the NAT is a Symmetrical NAT (which is typical in large enterprises), the Skype client cannot obtain this IP address and port information because NAT maps each unique IP address and port number pair to a different, externally visible IP address and port number pair. Because STUN is not useful for symmetrical NAT installations, Skype uses a relay traversal technique called Traversal Using Relay NAT (TURN). TURN is less desirable for Skype, since relaying adds a significant amount of latency to the communication. However, it does allow Skype to work. Once it has sorted out the NAT issues, the Skype client tries to log in by sending UDP packets to a supernode peer from its local supernode list. The supernode list has IP addresses and port numbers of supernodes that are waiting to service the client. If the list is empty, the Skype client tries to log in directly to the Skype log-in server. After logging in, the supernode list gets refreshed. If the transmission of UDP packets is restricted at the firewall, the Skype client tries to connect using TCP port numbers provided in the supernode list. If connection through TCP over the given ports does not work, the Skype client tries connecting using TCP over port 80 and 443, respectively hoping that the firewall will interpret the Skype traffic as HTTP/HTTPS traffic and allow it through.
User Search
Skype uses Global Index technology to search Skype users. Skype claims that their search functionality is distributed and is guaranteed to find a user if they exist and have logged in during last 72 hours. Search results are cached at intermediate nodes.
Because direct client traffic is blocked on the firewall, the Skype client cannot use the Skype ports to access the Internet. The Skype client will then attempt to use HTTP or HTTPS to connect to the Skype service. These requests will be intercepted by the ProxySG. By default, Skype-over-HTTP is blocked by the ProxySG because the ProxySG inspects all HTTP traffic to ensure that it conforms to standards-based HTTP protocols and Skype traffic does not conform. Skype then attempts to use HTTPS over port 443. The ProxySG will block this traffic by default (assuming the ProxySG SSL license is installed) because the ProxySG blocks all traffic on port 443 that does not contain a valid Secure Sockets Layer (SSL) certificate. The ProxySG will block all HTTPS traffic that does not have a valid SSL certificate (Secure Sockets Layer certificate). This will affect other port 443 traffic that does not use SSL certificates (such as some peer-to-peer applications).
2009-07-14 16:54:56-00:00UTC "SSL Proxy failed while processing CLIENT HELLO(error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol)" 0 310000:1 ../ssl_proxy/sslproxy_worker.cpp:2729 2009-07-14 16:54:56-00:00UTC "SSL Proxy failed while processing CLIENT HELLO(error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol)" 0 310000:1 ../ssl_proxy/sslproxy_worker.cpp:2729
Note: installation of this policy may result in a VPM compilation warning. This will be an error in the next major release. The user based policy can be changed to IP based to avoid this issue.
2 Save the file to your desktop or other convenient location. 3 Modify the policy to meet your requirements. The user names must be changed. 4 Using the ProxySG Management Console, open the Policy Files window; select Configuration > Policy > Policy Files. 5 Open the Install Local File from drop-down menu, select Text Editor, and then click Install. A browser window displays the Edit and Install the Local Policy File page. 6 Open the skype_cpl.txt file and copy the text. 7 Return to the Edit and Install the Local Policy File page and paste the contents of the skype_cpl.txt file at the end of the local policy file on your ProxySG. 8 Click Install. A page displays in the browser telling you whether the installation was successful. If necessary, correct any errors in the file and re-install it.
Blue Coat Systems, Inc.
www.bluecoat.com
Sunnyvale, CA USA // +1.408.220.2200
Corporate Headquarters
EMEA Headquarters
Hampshire, UK // +44.1252.554600
APAC Headquarters
Copyright 2009 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, IntelligenceCenter and BlueSource are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.TB-CONTROLLINGSKYPE-v5-1209