Disabling the QUIC protocol
This topic provides steps on how to disable QUIC protocol in Google Chrome and Opera browsers.
Overview
QUIC is the name for an experimental protocol and it stands for Quick UDP Internet Connection. The protocol supports a set multiplexed connections over UDP, and was designed to provide security protection equivalent to TLS/SSL, along with reduced connection and transport latency.
Some websites are not being filtered because they use the QUIC protocol. QUIC is not a standard SSL protocol and it is not filtered by MITM (certificate is not signed by MITM).
To check if a website is using the QUIC protocol in Google Chrome, install the “spdy http2 indicator” extension.
To check if a website is using the QUIC protocol in Opera, install the HTTP Headers extension.
Disabling QUIC protocol In Google Chrome
The QUIC protocol can be disabled by using one of these procedures:
Disable QUIC in Google Chrome:
In the URL type “chrome://flags”.
Search for “Experimental QUIC protocol” and disable it.
Use an Endpoint Security firewall rule.
To create a Firewall Application Rule blocking Chrome:
Open the policy currently running on the affected machines.
Add a Application Firewall Rule for chrome.exe.
Configure the Application Firewall Rule as follows:
Add a rule name and an application path for chrome.exe.
Under Settings, select the Any check box next to Local Address.
Select the Any check box next to Remote Address and add port 443 next to Port or port range.
Select UDP for Protocol, Both for Direction, and Any for IP.
Under Network, select the Home/Office and Public check boxes. For Permission, select Deny.
Click the Save button.
Apply the modified policy on the endpoints.
Disabling QUIC protocol via Group Policy
The QUIC protocol can be disabled using the Group Policy (GPO), by the following procedure:
Open the Group Policy editor console.
Under User Configuration, select Policies > Administrative Templates > Classic Administrative Templates > Google > Google Chrome.
Find the setting Allows QUIC protocol and set to Disabled.
Click Ok.
Disabling QUIC protocol in Opera
To solve this issue, you need to disable QUIC protocol by one of the following procedures:
Disable QUIC protocol in Opera:
In the URL field, type “opera://flags”.
Search for “Experimental QUIC protocol” and disable it.
Disable QUIC protocol by using a firewall rule for Opera.
In the GravityZone console, open the policy currently running on the affected machines.
Go to Firewall > Rules > Add and select Application.
In the configuration window, enter the path for opera.exe.
The path should be should be: C:\Program Files\Opera\XX.X.XXX.XXX\opera.exe, where the folder XX.X.XXX.XXX is the current installed version of Opera.
Next to Local Address, select the Any check box.Next to Local Address, select the Any check box.
Next to Remote Address, check the Any box and add 443 for Port or port range.
Save the changes and the policy.
Page Menu
- Bitdefender – GravityZone
- Viewing notifications
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Reports
- Report types
- Create reports
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Repair client
- Restart machine
- Network discovery
- Changing policy settings
- Configuring profiles
- Assigning policies
- Creating policies
- Troubleshooting
- Patch tasks
- Credentials Manager
- Best practices
- Renaming policies
- Computer policies
- Risk scan
- Update client
- Uninstall client
- Install
- Patch tasks
- Exchange scan
- Deleting policies
- Scan
- Scan for IOC
- Allow file download blocked by Bitdefender
- Features distribution
- Content Control
- Firewall
- Advanced Anti-Exploit
- HyperDetect
- Advanced Threat Control
- Antimalware
- Introduction
- Threats Xplorer
- Network Attack Defense
- Patch Management
- Device Control
- Container Protection
- Security for Storage
- eXtended Detection and Response (XDR)
- Endpoint Risk Analytics (ERA)
- Sandbox Analyzer
- Security for Exchange
- Full Disk Encryption
- Email Security
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Email Security Licensing & Provisioning
- Configure Email
- Add Mailbox
- Endpoint types
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Check my monthly subscription for Bitdefender Security for AWS