@bmeeks Thank you Bill!
I've re-read that, this time comprehensively, along with a complete read of "Taming the Beasts", truly a beast of a thread! While a lot of the material appears to be out-of-date, I definitely absorbed a lot from them and gained even more appreciation for the efforts from folks like you. I'm still a bit stunned by the sign off by @jflsakfja
Among the things I have learned, if I have these correct:
It is great to know about using a config file for disabling rules!
Notes on my TODO list:
SID Management, "Enable Automatic SID State Management"
Add disableSid.conf
Reference disableSid.conf under Disable SID File.
State order should be "Disable, Enable"
event_filter seems like it could be a good step before going full-draconian disable on a rule.
TODO: find out if these can go into a config file too.
The use of comments in disable lists is very helpful.
I may want to add some "golden rules" to ID and put a quick end to port scanners, but don't think these will be helpful until I am setting up an installation where I need to open ports and am ready to go full-monty and start blocking. Something like this I think:
drop tcp $EXTERNAL_NET any -> any !$MY_OPEN_PORTS (msg:"Golden Rule TCP"; classtype:network-scan; sid:9900001; rev:1;)
drop udp $EXTERNAL_NET any -> any !$MY_OPEN_PORTS (msg:"Golden Rule UDP"; classtype:network-scan; sid:9900002; rev:1;)
However, I am starting to wonder whether I can possibly have the time required to keep snort properly configured, as I don't support networks for a living, I develop software. I anticipate that many will say "maybe not, but then you won't have the time to deal with intrusion/malware either", and I would have to agree with that.
I have two use cases to consider:
Home/office network (protection from internal actors)
Pretty happy with all of the protection afforded by pfSense, VLAN-capable switches/APs, and pfBlockerNG-devel, but I recognize the limitations, especially with family laptops spending time connected to other networks. I love the idea of using Snort to identify and stop acquired malware.
Cloud-based web servers (protection from external actors)
Simply keeping the bad guys out and combatting DoS, I guess that's it?
(in addition of course, to keeping all software up-to-date, best practices, and all)
Certainly, I can cobble together a greatest hits collection of rules to disable, but that seems like such a leap of faith to me. Is that my best course of action? For both use cases?
thanks!
Bill